Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-11477 (GCVE-0-2019-11477)
Vulnerability from cvelistv5
- CWE-190 - Integer Overflow or Wraparound
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux kernel |
Version: 4.4 < 4.4.182 Version: 4.9 < 4.9.182 Version: 4.14 < 4.14.127 Version: 4.19 < 4.19.52 Version: 5.1 < 5.1.11 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:55:40.213Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#905115",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"name": "[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"name": "RHSA-2019:1594",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"name": "RHSA-2019:1602",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"name": "RHSA-2019:1699",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"name": "[oss-security] 20191023 Membership application for linux-distros - VMware",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"name": "[oss-security] 20191029 Re: Membership application for linux-distros - VMware",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Linux kernel",
"vendor": "Linux",
"versions": [
{
"lessThan": "4.4.182",
"status": "affected",
"version": "4.4",
"versionType": "custom"
},
{
"lessThan": "4.9.182",
"status": "affected",
"version": "4.9",
"versionType": "custom"
},
{
"lessThan": "4.14.127",
"status": "affected",
"version": "4.14",
"versionType": "custom"
},
{
"lessThan": "4.19.52",
"status": "affected",
"version": "4.19",
"versionType": "custom"
},
{
"lessThan": "5.1.11",
"status": "affected",
"version": "5.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jonathan Looney from Netflix"
}
],
"datePublic": "2019-06-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "CWE-190 Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-10-20T21:14:56",
"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"shortName": "canonical"
},
"references": [
{
"name": "VU#905115",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"name": "[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"name": "RHSA-2019:1594",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"name": "RHSA-2019:1602",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"name": "RHSA-2019:1699",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"name": "[oss-security] 20191023 Membership application for linux-distros - VMware",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"name": "[oss-security] 20191029 Re: Membership application for linux-distros - VMware",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
}
],
"source": {
"advisory": "https://usn.ubuntu.com/4017-1",
"defect": [
"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831637"
],
"discovery": "UNKNOWN"
},
"title": "Integer overflow in TCP_SKB_CB(skb)-\u003etcp_gso_segs",
"x_generator": {
"engine": "Vulnogram 0.0.7"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"AKA": "SACK Panic",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2019-06-17T00:00:00.000Z",
"ID": "CVE-2019-11477",
"STATE": "PUBLIC",
"TITLE": "Integer overflow in TCP_SKB_CB(skb)-\u003etcp_gso_segs"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux kernel",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "4.4",
"version_value": "4.4.182"
},
{
"version_affected": "\u003c",
"version_name": "4.9",
"version_value": "4.9.182"
},
{
"version_affected": "\u003c",
"version_name": "4.14",
"version_value": "4.14.127"
},
{
"version_affected": "\u003c",
"version_name": "4.19",
"version_value": "4.19.52"
},
{
"version_affected": "\u003c",
"version_name": "5.1",
"version_value": "5.1.11"
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jonathan Looney from Netflix"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.7"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-190 Integer Overflow or Wraparound"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#905115",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"name": "[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"name": "RHSA-2019:1594",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"name": "RHSA-2019:1602",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"name": "RHSA-2019:1699",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"name": "[oss-security] 20191023 Membership application for linux-distros - VMware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"name": "[oss-security] 20191029 Re: Membership application for linux-distros - VMware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md",
"refsource": "MISC",
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"name": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic",
"refsource": "MISC",
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"refsource": "MISC",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"name": "https://support.f5.com/csp/article/K78234183",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"name": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"name": "https://www.synology.com/security/advisory/Synology_SA_19_28",
"refsource": "CONFIRM",
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190625-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
}
]
},
"source": {
"advisory": "https://usn.ubuntu.com/4017-1",
"defect": [
"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831637"
],
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"assignerShortName": "canonical",
"cveId": "CVE-2019-11477",
"datePublished": "2019-06-18T23:34:51.026970Z",
"dateReserved": "2019-04-23T00:00:00",
"dateUpdated": "2024-09-17T02:21:15.995Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-11477\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2019-06-19T00:15:12.640\",\"lastModified\":\"2024-11-21T04:21:09.480\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.\"},{\"lang\":\"es\",\"value\":\"Jonathan Looney detect\u00f3 que el valor TCP_SKB_CB(skb)-mayor que tcp_gso_segs estuvo sujeto a un desbordamiento de enteros en el kernel de Linux durante el manejo del Reconocimiento Selectivo (SACK) de TCP. Un atacante remoto podr\u00eda usar esto para causar una denegaci\u00f3n de servicio. Esto se ha corregido en versiones de kernel estables 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, y se corrige en el commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@ubuntu.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.29\",\"versionEndExcluding\":\"3.16.69\",\"matchCriteriaId\":\"190D94DD-9CDB-413B-9A15-BFBDB1BB127C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"4.4.182\",\"matchCriteriaId\":\"D641CA66-86A4-4172-9D98-206C31578C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.182\",\"matchCriteriaId\":\"966342A3-015F-4BCC-A513-335362A79A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.127\",\"matchCriteriaId\":\"1A632572-BC71-422E-B953-346709BA1658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.52\",\"matchCriteriaId\":\"C91C6131-9445-46E6-960B-76E8A34DC7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.1.11\",\"matchCriteriaId\":\"E0E372D7-8DD5-45E7-9C26-CF389B1A09A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"33AF102E-2851-45B5-8C71-B393F34D4591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"5E4EA2A9-C197-40D4-A6AE-A64D69536F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"5A3215E6-7223-4AF1-BFD3-BD8AE9B6B572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"720A06E3-441B-4D51-8FC0-D569DD7FEB10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF1C75A-F753-40CB-9E26-DA6D31931DDC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"A057B236-8B7C-430D-B107-8FF96D132E73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"2D7877E8-E50F-4DC6-867D-C19A8DB533E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"899BE6FE-B23F-4236-8A5E-B41AFF28E533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"BEBAD7C4-AC37-463F-B63C-6EAD5542F2A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C046FBE7-DCCD-40FE-AC1F-4DAD11D2E0AC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"66FC8C37-629D-4FBA-9C79-615BDDCF7837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"66FCB095-3E70-472A-AB9D-60F001F3A539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"FA39C4F5-4D97-4B0B-8DA9-780F7ACF0A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"D2833083-97E9-4B3C-8E6B-BCAC1851D148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C7C45A-CC14-4092-903C-3001986D2859\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"42EBAE78-C03E-42C9-AC2D-D654A8DF8516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"75D817B1-EC06-4180-B272-067299818B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"0E3A4646-9AAA-445E-A08F-226D41485DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"09C950E6-BF12-43D4-9125-AD9D90EDD67A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A99DC2F-BFC7-4FEA-87DF-5E9DF428F2D3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"255D11E3-F502-45CD-8958-5989F179574E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"E72B035F-97C1-41C6-B424-F3929B9D7A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"E058E775-EAAA-46DF-9F3D-A8D042AAFD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"9AD3B4BB-7F5C-4565-9345-2D4895630AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B872A0D5-9B23-40F2-8AAB-253A4F406D18\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"10A57948-C53A-4CD0-801B-7E801D08E112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"F367EED9-1F71-4720-BE53-3074FF6049C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"20BF15AA-1183-489E-A24A-FFB5BFD84664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"83B684D2-5889-41EA-B54A-8E7AF43DA647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D0AF1B-9106-4C38-B1A2-87FC189ADBAB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"8E4A258E-4F20-4C3C-8269-CD7554539EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"1A5E9908-C959-48FD-8FAC-C0FE329E6FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"442A56A6-935D-427A-8562-144DD770E317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"6434ED4F-0BA2-445A-B6E9-D3E301EE3930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2A9F32-FF72-44AA-AA1A-5B09E8E57E24\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"1DA668DC-EFB6-44C3-8521-47BB9F474DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"C23EFF81-0FF4-4B4A-BAC3-85EC62230099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"24AB3C9F-77E5-4D87-A9C1-366B087E7F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"D17CC587-3325-4D95-BE63-B948C63B411D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB6D7D8-2688-48A2-8E3E-341881EF0B4C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"24904D5C-58FF-49B0-B598-F798BAD110E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"DE11CCA1-58BF-462E-A0DE-49F3BC1C5499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"639FCD86-C487-40DD-9840-8931FAF5DF3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"1117B40B-36E7-4205-82B0-52B4862A6D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12F0D363-0DE8-4E32-9187-D7ACA0868BD8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"DB112ABE-C07E-480F-8042-6321E602183D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"9A751827-1169-408E-BCE6-A129BDDB489D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"428C4BEA-AFDA-45EC-9D5F-DDF409461C33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"717C0443-3E88-4814-8D4A-F0C067176228\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3879431-2E02-4B6C-BB4F-C2FF631A0974\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"7865E258-CDA0-43A5-9945-81E07BF11A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"CAECED76-81A2-4A0C-8C2E-24C235BB32DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"BDC38EF1-6210-40A1-88FC-964C470E41BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"713EB3E7-A657-4F6A-901D-618AF660CBBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACA0835-51AD-4AC0-8C87-5564F3A821CD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"B572C267-AF06-4270-8FDC-18EBDDED7879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"88B12CA1-E853-4898-8A06-F991BE19A27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"4C98DCCF-2D89-4C05-A0AE-60CF8228B860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"B439DE9D-6A09-4487-82A4-E75A57717CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4F1CFB-0FD9-4AEB-BF25-093115F9D891\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.4\",\"matchCriteriaId\":\"19428E8B-18C2-413A-A3C0-AC6AB9F952F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.4\",\"matchCriteriaId\":\"6166E0DB-2BA5-454D-ABBC-9E4916436A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.1\",\"matchCriteriaId\":\"F42F4AF6-4BCC-497E-A889-0BBCA965CB32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0.0\",\"versionEndIncluding\":\"14.1.0\",\"matchCriteriaId\":\"AEC2164D-11D0-4DCD-B814-6AB185C3BADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4AE425-1D86-4DB9-8B8F-74C6678BD528\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF483911-003B-470B-A12B-85EF34A50469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79191794-6151-46E9-AAFD-3EC0C05B03B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"893A7EE9-495D-405A-B809-39DC80778B2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C60FA8B1-1802-4522-A088-22171DCF7A93\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D046F5-FF1A-41A7-8EDE-2C93E335906E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C8792C-1CF0-450B-A8BD-2B5274156053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CCBFDE-C2FA-40E3-AA44-0EB0A6861BD4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndIncluding\":\"5.1.0\",\"matchCriteriaId\":\"4E52F91D-3F39-4D89-8069-EC422FB1F700\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/20/3\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/10/24/1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/10/29/3\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2019-0010.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1594\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1602\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1699\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/tcpsack\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190625-0001/\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K78234183\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/905115\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_28\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-253-03\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/20/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/07/06/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/10/24/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/10/29/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2019-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1594\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/tcpsack\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190625-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K78234183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/905115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-253-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
suse-su-2019:1530-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will\nfragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an\nexpensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM existed. It could have occured with FUSE requests. (bnc#1133190)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bnc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- Update config files. Debug kernel is not supported (bsc#1135492).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpica: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).\n- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_acpi\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- asoc: fix valid stream condition (bsc#1051510).\n- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- asoc: stm32: fix sai driver name initialisation (bsc#1051510).\n- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix rtnh_ok() (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- hid: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- hid: input: add mapping for Assistant key (bsc#1051510).\n- hid: input: add mapping for Expose/Overview key (bsc#1051510).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- input: introduce KEY_ASSISTANT (bsc#1051510).\n- input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: fix stats update from local clients (git-fixes).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI: protect dma-mapping.h include (kabi).\n- kABI: protect functions using struct net_generic (bsc#1130409 LTC#176346).\n- kABI: protect ip_options_rcv_srr (kabi).\n- kABI: protect struct mlx5_td (kabi).\n- kABI: protect struct pci_dev (kabi).\n- kABI: protect struct smc_ib_device (bsc#1130409 LTC#176346).\n- kABI: protect struct smc_link (bsc#1129857 LTC#176247).\n- kABI: protect struct smcd_dev (bsc#1130409 LTC#176346).\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128905 LTC#176077).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev-\u003ebitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd-\u003ename (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoib, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net/smc: add pnet table namespace support (bsc#1130409 LTC#176346).\n- net/smc: add smcd support to the pnet table (bsc#1130409 LTC#176346).\n- net/smc: allow 16 byte pnetids in netlink policy (bsc#1129857 LTC#176247).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1130409 LTC#176346).\n- net/smc: allow pnetid-less configuration (bsc#1130409 LTC#176346).\n- net/smc: call smc_cdc_msg_send() under send_lock (bsc#1129857 LTC#176247).\n- net/smc: check connections in smc_lgr_free_work (bsc#1129857 LTC#176247).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: check port_idx of ib event (bsc#1129857 LTC#176247).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1130409 LTC#176346).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: correct state change for peer closing (bsc#1129857 LTC#176247).\n- net/smc: delete rkey first before switching to unused (bsc#1129857 LTC#176247).\n- net/smc: do not wait for send buffer space when data was already sent (bsc#1129857 LTC#176247).\n- net/smc: do not wait under send_lock (bsc#1129857 LTC#176247).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix another sizeof to int comparison (bsc#1129857 LTC#176247).\n- net/smc: fix byte_order for rx_curs_confirmed (bsc#1129848 LTC#176249).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: fix sender_free computation (bsc#1129857 LTC#176247).\n- net/smc: fix smc_poll in SMC_INIT state (bsc#1129848 LTC#176249).\n- net/smc: fix use of variable in cleared area (bsc#1129857 LTC#176247).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move code to clear the conn-\u003elgr field (bsc#1129857 LTC#176247).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: move wake up of close waiter (bsc#1129857 LTC#176247).\n- net/smc: no delay for free tx buffer wait (bsc#1129857 LTC#176247).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: postpone release of clcsock (bsc#1129857 LTC#176247).\n- net/smc: preallocated memory for rdma work requests (bsc#1129857 LTC#176247).\n- net/smc: prevent races between smc_lgr_terminate() and smc_conn_free() (bsc#1129857 LTC#176247).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: recvmsg and splice_read should return 0 after shutdown (bsc#1129857 LTC#176247).\n- net/smc: reduce amount of status updates to peer (bsc#1129857 LTC#176247).\n- net/smc: reset cursor update required flag (bsc#1129857 LTC#176247).\n- net/smc: rework pnet table (bsc#1130409 LTC#176346).\n- net/smc: unlock LGR pending lock earlier for SMC-D (bsc#1129857 LTC#176247).\n- net/smc: use client and server LGR pending locks for SMC-R (bsc#1129857 LTC#176247).\n- net/smc: use device link provided in qp_context (bsc#1129857 LTC#176247).\n- net/smc: use smc_curs_copy() for SMC-D (bsc#1129857 LTC#176247).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: legacy: do not unmask port bitmaps (git-fixes).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).\n- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).\n- netfilter: drop template ct when conntrack is skipped (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- nfs add module option to limit nfsv4 minor version (jsc#PM-231).\n- nfs: Enable nfsv4.2 support - jsc@PM-231 This requires a module parameter for nfsv4.2 to actually be available on SLE12 and SLE15-SP0\n- nfsv4.x: always serialize open/close operations (bsc#1114893).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packet: validate msg_namelen in send directly (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- pci: Factor out pcie_retrain_link() function (git-fixes).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- pci: Work around Pericom pcie-to-pci bridge Retrain Link erratum (git-fixes).\n- pci: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- proc/kcore: do not bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- s390/ism: ignore some errors during deregistration (bsc#1129857 LTC#176247).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- sctp: only update outstanding_bytes for transmitted queue when doing prsctp_prune (git-fixes).\n- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- smc: move unhash as early as possible in smc_release() (bsc#1129857 LTC#176247).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: serial_core, add -\u003einstall (bnc#1129693).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: cdc-acm: fix unthrottle races (bsc#1051510).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- usb: serial: fix unthrottle races (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- usb: yurex: Fix protection fault after device removal (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).\n- xfrm: Return error on unknown encap_type in init_state (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1530,SUSE-SLE-DESKTOP-12-SP4-2019-1530,SUSE-SLE-HA-12-SP4-2019-1530,SUSE-SLE-Live-Patching-12-SP4-2019-1530,SUSE-SLE-SDK-12-SP4-2019-1530,SUSE-SLE-SERVER-12-SP4-2019-1530,SUSE-SLE-WE-12-SP4-2019-1530",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1530-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1530-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1530-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1114893",
"url": "https://bugzilla.suse.com/1114893"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119843",
"url": "https://bugzilla.suse.com/1119843"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128905",
"url": "https://bugzilla.suse.com/1128905"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129497",
"url": "https://bugzilla.suse.com/1129497"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1129848",
"url": "https://bugzilla.suse.com/1129848"
},
{
"category": "self",
"summary": "SUSE Bug 1129857",
"url": "https://bugzilla.suse.com/1129857"
},
{
"category": "self",
"summary": "SUSE Bug 1130409",
"url": "https://bugzilla.suse.com/1130409"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1132894",
"url": "https://bugzilla.suse.com/1132894"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134591",
"url": "https://bugzilla.suse.com/1134591"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134607",
"url": "https://bugzilla.suse.com/1134607"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:18:47Z",
"generator": {
"date": "2019-06-17T17:18:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1530-1",
"initial_release_date": "2019-06-17T17:18:47Z",
"revision_history": [
{
"date": "2019-06-17T17:18:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.19.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-al-4.12.14-95.19.1.aarch64",
"product_id": "dtb-al-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-allwinner-4.12.14-95.19.1.aarch64",
"product_id": "dtb-allwinner-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-altera-4.12.14-95.19.1.aarch64",
"product_id": "dtb-altera-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-amd-4.12.14-95.19.1.aarch64",
"product_id": "dtb-amd-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-amlogic-4.12.14-95.19.1.aarch64",
"product_id": "dtb-amlogic-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-apm-4.12.14-95.19.1.aarch64",
"product_id": "dtb-apm-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-arm-4.12.14-95.19.1.aarch64",
"product_id": "dtb-arm-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-broadcom-4.12.14-95.19.1.aarch64",
"product_id": "dtb-broadcom-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-cavium-4.12.14-95.19.1.aarch64",
"product_id": "dtb-cavium-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-exynos-4.12.14-95.19.1.aarch64",
"product_id": "dtb-exynos-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-freescale-4.12.14-95.19.1.aarch64",
"product_id": "dtb-freescale-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-hisilicon-4.12.14-95.19.1.aarch64",
"product_id": "dtb-hisilicon-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-lg-4.12.14-95.19.1.aarch64",
"product_id": "dtb-lg-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-marvell-4.12.14-95.19.1.aarch64",
"product_id": "dtb-marvell-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-mediatek-4.12.14-95.19.1.aarch64",
"product_id": "dtb-mediatek-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-nvidia-4.12.14-95.19.1.aarch64",
"product_id": "dtb-nvidia-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-qcom-4.12.14-95.19.1.aarch64",
"product_id": "dtb-qcom-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-renesas-4.12.14-95.19.1.aarch64",
"product_id": "dtb-renesas-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-rockchip-4.12.14-95.19.1.aarch64",
"product_id": "dtb-rockchip-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-socionext-4.12.14-95.19.1.aarch64",
"product_id": "dtb-socionext-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-sprd-4.12.14-95.19.1.aarch64",
"product_id": "dtb-sprd-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-xilinx-4.12.14-95.19.1.aarch64",
"product_id": "dtb-xilinx-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-4.12.14-95.19.1.aarch64",
"product": {
"name": "dtb-zte-4.12.14-95.19.1.aarch64",
"product_id": "dtb-zte-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.19.1.aarch64",
"product_id": "kernel-default-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.19.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.19.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.19.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.19.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.19.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.19.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.19.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.19.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.19.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.19.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.19.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.19.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.19.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.19.1.noarch",
"product_id": "kernel-devel-4.12.14-95.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.19.1.noarch",
"product_id": "kernel-docs-4.12.14-95.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.19.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.19.1.noarch",
"product_id": "kernel-macros-4.12.14-95.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.19.1.noarch",
"product_id": "kernel-source-4.12.14-95.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.19.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.19.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.19.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.19.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.19.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.19.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.19.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.19.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.19.1.s390x",
"product_id": "kernel-obs-build-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.19.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.19.1.s390x",
"product_id": "kernel-syms-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.19.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.19.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.19.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.19.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.19.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.19.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.19.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.19.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.19.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.19.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.19.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.19.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.19.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.19.1.x86_64",
"product_id": "kernel-default-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.19.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.19.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.19.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.19.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.19.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.19.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.19.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.19.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.19.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.19.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.19.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.19.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.19.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.19.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.19.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.19.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_19-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.19.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.19.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:47Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:2658-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-18551: An issue was discovered in drivers/i2c/i2c-core-smbus.c. There was an out of bounds write in the function i2c_smbus_xfer_emulated (bnc#1146163).\n- CVE-2017-18595: A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).\n- CVE-2018-20976: An issue was discovered in fs/xfs/xfs_super.c. A use after free exists, related to xfs_fs_fill_super failure (bnc#1146285).\n- CVE-2018-21008: A use-after-free could have been caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c (bnc#1149591).\n- CVE-2019-10207: A local denial of service using HCIUARTSETPROTO/HCI_UART_MRVL was fixed (bnc#1123959 bnc#1142857).\n- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bnc#1132686 bnc#1137586).\n- CVE-2019-14814: There was a heap-based buffer overflow in the Marvell wifi chip driver, that allowed local users to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1146512).\n- CVE-2019-14814: There was a heap-based buffer overflow in the Marvell wifi chip driver, that allowed local users to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1146512).\n- CVE-2019-14816: There was a heap-based buffer overflow in the Marvell wifi chip driver, that allowed local users to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1146516).\n- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).\n- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could have used this flaw to increase their privileges on the host (bnc#1150112).\n- CVE-2019-15030: In the Linux kernel on the powerpc platform, a local user could have read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check (bnc#1149713).\n- CVE-2019-15031: In the Linux kernel on the powerpc platform, a local user could have read vector registers of other users\u0027 processes via an interrupt. To exploit the vulnerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE was misused in arch/powerpc/kernel/process.c (bnc#1149713).\n- CVE-2019-15090: An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the qedi_dbg_* family of functions, there is an out-of-bounds read (bnc#1146399).\n- CVE-2019-15098: drivers/net/wireless/ath/ath6kl/usb.c had a NULL pointer dereference via an incomplete address in an endpoint descriptor (bnc#1146378).\n- CVE-2019-15099: drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel had a NULL pointer dereference via an incomplete address in an endpoint descriptor (bnc#1146368).\n- CVE-2019-15117: parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel mishandled a short descriptor, leading to out-of-bounds memory access (bnc#1145920).\n- CVE-2019-15118: check_input_term in sound/usb/mixer.c mishandled recursion, leading to kernel stack exhaustion (bnc#1145922).\n- CVE-2019-15211: There was a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c did not properly allocate memory (bnc#1146519).\n- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver (bnc#1146391).\n- CVE-2019-15214: There was a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c (bnc#1146550).\n- CVE-2019-15215: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver (bnc#1146425).\n- CVE-2019-15216: There was a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1146361).\n- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver (bnc#1146547).\n- CVE-2019-15218: There was a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver (bnc#1146413).\n- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver (bnc#1146524).\n- CVE-2019-15220: There was a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver (bnc#1146526).\n- CVE-2019-15221: There was a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver (bnc#1146529).\n- CVE-2019-15222: There was a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver (bnc#1146531).\n- CVE-2019-15239: An incorrect backport of a certain net/ipv4/tcp_output.c fix allowed a local attacker to trigger multiple use-after-free conditions. This could result in a kernel crash, or potentially in privilege escalation. (bsc#1146589)\n- CVE-2019-15290: There was a NULL pointer dereference caused by a malicious USB device in the ath6kl_usb_alloc_urb_from_pipe function (bsc#1146543).\n- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver (bnc#1146540).\n- CVE-2019-15292: There was a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c (bnc#1146678).\n- CVE-2019-15538: An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS (bnc#1148093).\n- CVE-2019-15666: There was an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandled directory validation (bnc#1148394).\n- CVE-2019-15902: Misuse of the upstream \u0027x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\u0027 commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped (bnc#1149376).\n- CVE-2019-15917: There was a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c (bnc#1149539).\n- CVE-2019-15919: SMB2_write in fs/cifs/smb2pdu.c had a use-after-free (bnc#1149552).\n- CVE-2019-15920: SMB2_read in fs/cifs/smb2pdu.c had a use-after-free. (bnc#1149626).\n- CVE-2019-15921: There was a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c (bnc#1149602).\n- CVE-2019-15924: fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c had a NULL pointer dereference because there was no -ENOMEM upon an alloc_workqueue failure (bnc#1149612).\n- CVE-2019-15926: An out-of-bounds access existed in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c (bnc#1149527).\n- CVE-2019-15927: An issue was discovered in the Linux kernel An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c (bnc#1149522).\n- CVE-2019-9456: In the Pixel C USB monitor driver there was a possible OOB write due to a missing bounds check. This could have led to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1150025).\n- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permitted sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka \u0027KNOB\u0027) that could decrypt traffic and injected arbitrary ciphertext without the victim noticing (bnc#1137865 bnc#1146042).\n\n\nThe following non-security bugs were fixed:\n\n- 9p: acl: fix uninitialized iattr access (bsc#1051510).\n- 9p: p9dirent_read: check network-provided name length (bsc#1051510).\n- 9p: pass the correct prototype to read_cache_page (bsc#1051510).\n- 9p/rdma: do not disconnect on down_interruptible EAGAIN (bsc#1051510).\n- 9p/rdma: remove useless check in cm_event_handler (bsc#1051510).\n- 9p/virtio: Add cleanup path in p9_virtio_init (bsc#1051510).\n- 9p/xen: Add cleanup path in p9_trans_xen_init (bsc#1051510).\n- 9p/xen: fix check for xenbus_read error in front_probe (bsc#1051510).\n- acpi/arm64: ignore 5.1 FADTs that are reported as 5.0 (bsc#1051510).\n- ACPICA: Increase total number of possible Owner IDs (bsc#1148859).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPI: fix false-positive -Wuninitialized warning (bsc#1051510).\n- ACPI/IORT: Fix off-by-one check in iort_dev_find_its_id() (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI: PM: Fix regression in acpi_device_set_power() (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- Add missing structs and defines from recent SMB3.1.1 documentation (bsc#1144333).\n- Add new flag on SMB3.1.1 read (bsc#1144333).\n- address lock imbalance warnings in smbdirect.c (bsc#1144333).\n- Add some missing debug fields in server and tcon structs (bsc#1144333).\n- add some missing definitions (bsc#1144333).\n- Add some qedf commits to blacklist file (bsc#1149976)\n- Add vers=3.0.2 as a valid option for SMBv3.0.2 (bsc#1144333).\n- af_key: fix leaks in key_pol_get_resp and dump_sp (bsc#1051510).\n- af_packet: Block execution of tasks waiting for transmit to complete in AF_PACKET (networking-stable-19_07_02).\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: firewire: fix a memory leak bug (bsc#1051510).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add a generic reboot_notify (bsc#1051510).\n- ALSA: hda - Apply workaround for another AMD chip 1022:1487 (bsc#1051510).\n- ALSA: hda/ca0132 - Add new SBZ quirk (bsc#1051510).\n- ALSA: hda - Do not override global PCM hw info flag (bsc#1051510).\n- ALSA: hda: Fix 1-minute detection delay when i915 module is not available (bsc#1111666).\n- ALSA: hda - Fix a memory leak bug (bsc#1051510).\n- ALSA: hda - Fixes inverted Conexant GPIO mic mute led (bsc#1051510).\n- ALSA: hda - Fix potential endless loop at applying quirks (bsc#1051510).\n- ALSA: hda: kabi workaround for generic parser flag (bsc#1051510).\n- ALSA: hda - Let all conexant codec enter D3 when rebooting (bsc#1051510).\n- ALSA: hda/realtek - Add quirk for HP Envy x360 (bsc#1051510).\n- ALSA: hda/realtek - Add quirk for HP Pavilion 15 (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker \u0026 headset mic of ASUS UX431FL (bsc#1051510).\n- ALSA: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).\n- ALSA: hda - Workaround for crackled sound on AMD controller (1022:1457) (bsc#1051510).\n- ALSA: hiface: fix multiple memory leak bugs (bsc#1051510).\n- ALSA: line6: Fix memory leak at line6_init_pcm() error path (bsc#1051510).\n- ALSA: pcm: fix lost wakeup event scenarios in snd_pcm_drain (bsc#1051510).\n- ALSA: seq: Fix potential concurrent access to the deleted pool (bsc#1051510).\n- ALSA: usb-audio: Add implicit fb quirk for Behringer UFX1604 (bsc#1051510).\n- ALSA: usb-audio: Check mixer unit bitmap yet more strictly (bsc#1051510).\n- ALSA: usb-audio: fix a memory leak bug (bsc#1111666).\n- ALSA: usb-audio: Fix gpf in snd_usb_pipe_sanity_check (bsc#1051510).\n- ALSA: usb-audio: Fix invalid NULL check in snd_emuusb_set_samplerate() (bsc#1051510).\n- arm64: fix undefined reference to \u0027printk\u0027 (bsc#1148219).\n- arm64/kernel: enable A53 erratum #8434319 handling at runtime (bsc#1148219).\n- arm64/kernel: rename module_emit_adrp_veneer-\u003emodule_emit_veneer_for_adrp (bsc#1148219).\n- arm64: KVM: Fix architecturally invalid reset value for FPEXC32_EL2 (bsc#1133021).\n- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1148219).\n- arm64: PCI: Preserve firmware configuration when desired (SLE-9332).\n- ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling (bsc#1133021).\n- ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1 (bsc#1133021).\n- ASoC: dapm: Fix handling of custom_stop_condition on DAPM graph walks (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: Fail card instantiation if DAI format setup fails (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- ata: libahci: do not complain in case of deferred probe (bsc#1051510).\n- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).\n- ath10k: Change the warning message string (bsc#1051510).\n- ath10k: Drop WARN_ON()s that always trigger during system resume (bsc#1111666).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- batman-adv: fix uninit-value in batadv_netlink_get_ifindex() (bsc#1051510).\n- batman-adv: Only read OGM2 tvlv_len after buffer len check (bsc#1051510).\n- batman-adv: Only read OGM tvlv_len after buffer len check (bsc#1051510).\n- bcache: fix possible memory leak in bch_cached_dev_run() (git fixes).\n- bcache: Revert \u0027bcache: use sysfs_match_string() instead of __sysfs_match_string()\u0027 (git fixes).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- bio: fix improper use of smp_mb__before_atomic() (git fixes).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: Fix spelling in a source code comment (git fixes).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).\n- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).\n- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).\n- block, documentation: Fix wbt_lat_usec documentation (git fixes).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- Bluetooth: 6lowpan: search for destination address in all peers (bsc#1051510).\n- Bluetooth: Add SMP workaround Microsoft Surface Precision Mouse bug (bsc#1051510).\n- Bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).\n- Bluetooth: Check state in l2cap_disconnect_rsp (bsc#1051510).\n- Bluetooth: hci_bcsp: Fix memory leak in rx_skb (bsc#1051510).\n- Bluetooth: validate BLE connection interval updates (bsc#1051510).\n- bnx2fc_fcoe: Use skb_queue_walk_safe() (bsc#1136502 jsc#SLE-4703).\n- bnx2x: Disable multi-cos feature (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Prevent ptp_task to be rescheduled indefinitely (networking-stable-19_07_25).\n- bnxt_en: Fix to include flow direction in L2 key (bsc#1104745 ).\n- bnxt_en: Fix VNIC clearing logic for 57500 chips (bsc#1104745 ).\n- bnxt_en: Improve RX doorbell sequence (bsc#1104745).\n- bnxt_en: Use correct src_fid to determine direction of the flow (bsc#1104745).\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bonding: Always enable vlan tx offload (networking-stable-19_07_02).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).\n- bonding: validate ip header before check IPPROTO_IGMP (networking-stable-19_07_25).\n- bpf: sockmap, only create entry if ulp is not already enabled (bsc#1109837).\n- bpf: sockmap, sock_map_delete needs to use xchg (bsc#1109837).\n- bpf: sockmap, synchronize_rcu before free\u0027ing map (bsc#1109837).\n- btrfs: add a helper to retrive extent inline ref type (bsc#1149325).\n- btrfs: add cleanup_ref_head_accounting helper (bsc#1050911).\n- btrfs: add missing inode version, ctime and mtime updates when punching hole (bsc#1140487).\n- btrfs: add one more sanity check for shared ref type (bsc#1149325).\n- btrfs: clean up pending block groups when transaction commit aborts (bsc#1050911).\n- btrfs: convert to use btrfs_get_extent_inline_ref_type (bsc#1149325).\n- btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).\n- btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).\n- btrfs: fix data loss after inode eviction, renaming it, and fsync it (bsc#1145941).\n- btrfs: Fix delalloc inodes invalidation during transaction abort (bsc#1050911).\n- btrfs: fix fsync not persisting dentry deletions due to inode evictions (bsc#1145942).\n- btrfs: fix incremental send failure after deduplication (bsc#1145940).\n- btrfs: fix pinned underflow after transaction aborted (bsc#1050911).\n- btrfs: fix race between send and deduplication that lead to failures and crashes (bsc#1145059).\n- btrfs: fix race leading to fs corruption after transaction abort (bsc#1145937).\n- btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- btrfs: handle delayed ref head accounting cleanup in abort (bsc#1050911).\n- btrfs: prevent send failures and crashes due to concurrent relocation (bsc#1145059).\n- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- btrfs: remove BUG() in add_data_reference (bsc#1149325).\n- btrfs: remove BUG() in btrfs_extent_inline_ref_size (bsc#1149325).\n- btrfs: remove BUG() in print_extent_item (bsc#1149325).\n- btrfs: remove BUG_ON in __add_tree_block (bsc#1149325).\n- btrfs: scrub: add memalloc_nofs protection around init_ipath (bsc#1086103).\n- btrfs: Split btrfs_del_delalloc_inode into 2 functions (bsc#1050911).\n- btrfs: start readahead also in seed devices (bsc#1144886).\n- btrfs: track running balance in a simpler way (bsc#1145059).\n- btrfs: use GFP_KERNEL in init_ipath (bsc#1086103).\n- caif-hsi: fix possible deadlock in cfhsi_exit_module() (networking-stable-19_07_25).\n- can: m_can: implement errata \u0027Needless activation of MRAF irq\u0027 (bsc#1051510).\n- can: mcp251x: add support for mcp25625 (bsc#1051510).\n- can: peak_usb: fix potential double kfree_skb() (bsc#1051510).\n- can: peak_usb: force the string buffer NULL-terminated (bsc#1051510).\n- can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices (bsc#1051510).\n- can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices (bsc#1051510).\n- can: rcar_canfd: fix possible IRQ storm on high load (bsc#1051510).\n- can: sja1000: force the string buffer NULL-terminated (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1142635).\n- ceph: add btime field to ceph_inode_info (bsc#1148133 bsc#1136682).\n- ceph: add ceph.snap.btime vxattr (bsc#1148133 bsc#1148570).\n- ceph: add change_attr field to ceph_inode_info (bsc#1148133 bsc#1136682).\n- ceph: always get rstat from auth mds (bsc#1146346).\n- ceph: carry snapshot creation time with inodes (bsc#1148133 bsc#1148570).\n- ceph: clean up ceph.dir.pin vxattr name sizeof() (bsc#1146346).\n- ceph: clear page dirty before invalidate page (bsc#1148133).\n- ceph: decode feature bits in session message (bsc#1146346).\n- ceph: do not blindly unregister session that is in opening state (bsc#1148133).\n- ceph: do not try fill file_lock on unsuccessful GETFILELOCK reply (bsc#1148133).\n- ceph: fix buffer free while holding i_ceph_lock in __ceph_build_xattrs_blob() (bsc#1148133).\n- ceph: fix buffer free while holding i_ceph_lock in __ceph_setxattr() (bsc#1148133).\n- ceph: fix buffer free while holding i_ceph_lock in fill_inode() (bsc#1148133).\n- ceph: fix \u0027ceph.dir.rctime\u0027 vxattr value (bsc#1148133 bsc#1135219).\n- ceph: fix decode_locker to use ceph_decode_entity_addr (bsc#1148133 bsc#1136682).\n- ceph: fix improper use of smp_mb__before_atomic() (bsc#1148133).\n- ceph: fix infinite loop in get_quota_realm() (bsc#1148133).\n- ceph: fix iov_iter issues in ceph_direct_read_write() (bsc#1141450).\n- ceph: fix listxattr vxattr buffer length calculation (bsc#1148133 bsc#1148570).\n- ceph: handle btime in cap messages (bsc#1148133 bsc#1136682).\n- ceph: handle change_attr in cap messages (bsc#1148133 bsc#1136682).\n- ceph: have MDS map decoding use entity_addr_t decoder (bsc#1148133 bsc#1136682).\n- ceph: hold i_ceph_lock when removing caps for freeing inode (bsc#1148133).\n- ceph: increment change_attribute on local changes (bsc#1148133 bsc#1136682).\n- ceph: initialize superblock s_time_gran to 1 (bsc#1148133).\n- ceph: remove request from waiting list before unregister (bsc#1148133).\n- ceph: remove unused vxattr length helpers (bsc#1148133 bsc#1148570).\n- ceph: silence a checker warning in mdsc_show() (bsc#1148133).\n- ceph: support cephfs\u0027 own feature bits (bsc#1146346).\n- ceph: support getting ceph.dir.pin vxattr (bsc#1146346).\n- ceph: support versioned reply (bsc#1146346).\n- ceph: use bit flags to define vxattr attributes (bsc#1146346).\n- ceph: use ceph_evict_inode to cleanup inode\u0027s resource (bsc#1148133).\n- cifs: Accept validate negotiate if server return NT_STATUS_NOT_SUPPORTED (bsc#1144333).\n- cifs: add a new SMB2_close_flags function (bsc#1144333).\n- cifs: add a smb2_compound_op and change QUERY_INFO to use it (bsc#1144333).\n- cifs: add a timeout argument to wait_for_free_credits (bsc#1144333).\n- cifs: add a warning if we try to to dequeue a deleted mid (bsc#1144333).\n- cifs: add compound_send_recv() (bsc#1144333).\n- cifs: add CONFIG_CIFS_DEBUG_KEYS to dump encryption keys (bsc#1144333).\n- cifs: add credits from unmatched responses/messages (bsc#1144333).\n- cifs: add debug output to show nocase mount option (bsc#1144333).\n- cifs: Add DFS cache routines (bsc#1144333).\n- cifs: Add direct I/O functions to file_operations (bsc#1144333).\n- cifs: add fiemap support (bsc#1144333).\n- cifs: add iface info to struct cifs_ses (bsc#1144333).\n- cifs: add IOCTL for QUERY_INFO passthrough to userspace (bsc#1144333).\n- cifs: add lease tracking to the cached root fid (bsc#1144333).\n- cifs: Add minor debug message during negprot (bsc#1144333).\n- cifs: add missing debug entries for kconfig options (bsc#1051510, bsc#1144333).\n- cifs: add missing GCM module dependency (bsc#1144333).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510, bsc#1144333).\n- cifs: add ONCE flag for cifs_dbg type (bsc#1144333).\n- cifs: add pdu_size to the TCP_Server_Info structure (bsc#1144333).\n- cifs: add resp_buf_size to the mid_q_entry structure (bsc#1144333).\n- cifs: address trivial coverity warning (bsc#1144333).\n- cifs: add server argument to the dump_detail method (bsc#1144333).\n- cifs: add server-\u003evals-\u003eheader_preamble_size (bsc#1144333).\n- cifs: add SFM mapping for 0x01-0x1F (bsc#1144333).\n- cifs: add sha512 secmech (bsc#1051510, bsc#1144333).\n- cifs: Adds information-level logging function (bsc#1144333).\n- cifs: add SMB2_close_init()/SMB2_close_free() (bsc#1144333).\n- cifs: add SMB2_ioctl_init/free helpers to be used with compounding (bsc#1144333).\n- cifs: add SMB2_query_info_[init|free]() (bsc#1144333).\n- cifs: Add smb2_send_recv (bsc#1144333).\n- cifs: add spinlock for the openFileList to cifsInodeInfo (bsc#1144333).\n- cifs: add .splice_write (bsc#1144333).\n- cifs: Add support for direct I/O read (bsc#1144333).\n- cifs: Add support for direct I/O write (bsc#1144333).\n- cifs: Add support for direct pages in rdata (bsc#1144333).\n- cifs: Add support for direct pages in wdata (bsc#1144333).\n- cifs: Add support for failover in cifs_mount() (bsc#1144333).\n- cifs: Add support for failover in cifs_reconnect() (bsc#1144333).\n- cifs: Add support for failover in cifs_reconnect_tcon() (bsc#1144333).\n- cifs: Add support for failover in smb2_reconnect() (bsc#1144333).\n- cifs: Add support for FSCTL passthrough that write data to the server (bsc#1144333).\n- cifs: add support for ioctl on directories (bsc#1144333).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510, bsc#1144333).\n- cifs: add support for SEEK_DATA and SEEK_HOLE (bsc#1144333).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510, bsc#1144333).\n- cifs: Adjust MTU credits before reopening a file (bsc#1144333).\n- cifs: Allocate memory for all iovs in smb2_ioctl (bsc#1144333).\n- cifs: Allocate validate negotiation request through kmalloc (bsc#1144333).\n- cifs: allow calling SMB2_xxx_free(NULL) (bsc#1144333).\n- cifs: allow disabling insecure dialects in the config (bsc#1144333).\n- cifs: allow disabling less secure legacy dialects (bsc#1144333).\n- cifs: allow guest mounts to work for smb3.11 (bsc#1051510, bsc#1144333).\n- cifs: always add credits back for unsolicited PDUs (bsc#1144333).\n- cifs: Always reset read error to -EIO if no response (bsc#1144333).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510, bsc#1144333).\n- cifs: a smb2_validate_and_copy_iov failure does not mean the handle is invalid (bsc#1144333).\n- cifs: auto disable \u0027serverino\u0027 in dfs mounts (bsc#1144333).\n- cifs: avoid a kmalloc in smb2_send_recv/SendReceive2 for the common case (bsc#1144333).\n- cifs: Avoid returning EBUSY to upper layer VFS (bsc#1144333).\n- cifs: cache FILE_ALL_INFO for the shared root handle (bsc#1144333).\n- cifs: Calculate the correct request length based on page offset and tail size (bsc#1144333).\n- cifs: Call MID callback before destroying transport (bsc#1144333).\n- cifs: change mkdir to use a compound (bsc#1144333).\n- cifs: change smb2_get_data_area_len to take a smb2_sync_hdr as argument (bsc#1144333).\n- cifs: Change SMB2_open to return an iov for the error parameter (bsc#1144333).\n- cifs: change SMB2_OP_RENAME and SMB2_OP_HARDLINK to use compounding (bsc#1144333).\n- cifs: change SMB2_OP_SET_EOF to use compounding (bsc#1144333).\n- cifs: change SMB2_OP_SET_INFO to use compounding (bsc#1144333).\n- cifs: change smb2_query_eas to use the compound query-info helper (bsc#1144333).\n- cifs: change unlink to use a compound (bsc#1144333).\n- cifs: change validate_buf to validate_iov (bsc#1144333).\n- cifs: change wait_for_free_request() to take flags as argument (bsc#1144333).\n- cifs: check CIFS_MOUNT_NO_DFS when trying to reuse existing sb (bsc#1144333).\n- cifs: Check for reconnects before sending async requests (bsc#1144333).\n- cifs: Check for reconnects before sending compound requests (bsc#1144333).\n- cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902, bsc#1144333).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171, bsc#1144333).\n- cifs: check if SMB2 PDU size has been padded and suppress the warning (bsc#1144333).\n- cifs: check kmalloc before use (bsc#1051510, bsc#1144333).\n- cifs: check kzalloc return (bsc#1144333).\n- cifs: check MaxPathNameComponentLength != 0 before using it (bsc#1085536, bsc#1144333).\n- cifs: check ntwrk_buf_start for NULL before dereferencing it (bsc#1144333).\n- cifs: check rsp for NULL before dereferencing in SMB2_open (bsc#1085536, bsc#1144333).\n- cifs: cifs_read_allocate_pages: do not iterate through whole page array on ENOMEM (bsc#1144333).\n- cifs: clean up indentation, replace spaces with tab (bsc#1144333).\n- cifs: cleanup smb2ops.c and normalize strings (bsc#1144333).\n- cifs: complete PDU definitions for interface queries (bsc#1144333).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510, bsc#1144333).\n- cifs: Count SMB3 credits for malformed pending responses (bsc#1144333).\n- cifs: create a define for how many iovs we need for an SMB2_open() (bsc#1144333).\n- cifs: create a define for the max number of iov we need for a SMB2 set_info (bsc#1144333).\n- cifs: create a helper function for compound query_info (bsc#1144333).\n- cifs: create helpers for SMB2_set_info_init/free() (bsc#1144333).\n- cifs: create SMB2_open_init()/SMB2_open_free() helpers (bsc#1144333).\n- cifs: Display SMB2 error codes in the hex format (bsc#1144333).\n- cifs: document tcon/ses/server refcount dance (bsc#1144333).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097, bsc#1144333).\n- cifs: Do not assume one credit for async responses (bsc#1144333).\n- cifs: do not attempt cifs operation on smb2+ rename error (bsc#1144333).\n- cifs: Do not consider -ENODATA as stat failure for reads (bsc#1144333).\n- cifs: Do not count -ENODATA as failure for query directory (bsc#1051510, bsc#1144333).\n- cifs: do not dereference smb_file_target before null check (bsc#1051510, bsc#1144333).\n- cifs: Do not hide EINTR after sending network packets (bsc#1051510, bsc#1144333).\n- cifs: Do not log credits when unmounting a share (bsc#1144333).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510, bsc#1144333).\n- cifs: Do not match port on SMBDirect transport (bsc#1144333).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510, bsc#1144333).\n- cifs: Do not reconnect TCP session in add_credits() (bsc#1051510, bsc#1144333).\n- cifs: Do not reset lease state to NONE on lease break (bsc#1051510, bsc#1144333).\n- cifs: do not return atime less than mtime (bsc#1144333).\n- cifs: do not send invalid input buffer on QUERY_INFO requests (bsc#1144333).\n- cifs: Do not set credits to 1 if the server didn\u0027t grant anything (bsc#1144333).\n- cifs: do not show domain= in mount output when domain is empty (bsc#1144333).\n- cifs: Do not skip SMB2 message IDs on send failures (bsc#1144333).\n- cifs: do not use __constant_cpu_to_le32() (bsc#1144333).\n- cifs: dump every session iface info (bsc#1144333).\n- cifs: dump IPC tcon in debug proc file (bsc#1071306, bsc#1144333).\n- cifs: fallback to older infolevels on findfirst queryinfo retry (bsc#1144333).\n- cifs: Find and reopen a file before get MTU credits in writepages (bsc#1144333).\n- cifs: fix a buffer leak in smb2_query_symlink (bsc#1144333).\n- cifs: fix a credits leak for compund commands (bsc#1144333).\n- cifs: Fix a debug message (bsc#1144333).\n- cifs: Fix adjustment of credits for MTU requests (bsc#1051510, bsc#1144333).\n- cifs: Fix an issue with re-sending rdata when transport returning -EAGAIN (bsc#1144333).\n- cifs: Fix an issue with re-sending wdata when transport returning -EAGAIN (bsc#1144333).\n- cifs: Fix a race condition with cifs_echo_request (bsc#1144333).\n- cifs: Fix a tiny potential memory leak (bsc#1144333).\n- cifs: Fix autonegotiate security settings mismatch (bsc#1087092, bsc#1144333).\n- cifs: fix bi-directional fsctl passthrough calls (bsc#1144333).\n- cifs: fix build break when CONFIG_CIFS_DEBUG2 enabled (bsc#1144333).\n- cifs: fix build errors for SMB_DIRECT (bsc#1144333).\n- cifs: Fix check for matching with existing mount (bsc#1144333).\n- cifs: fix circular locking dependency (bsc#1064701, bsc#1144333).\n- cifs: fix computation for MAX_SMB2_HDR_SIZE (bsc#1144333).\n- cifs: fix confusing warning message on reconnect (bsc#1144333).\n- cifs: fix crash in cifs_dfs_do_automount (bsc#1144333).\n- cifs: fix crash in smb2_compound_op()/smb2_set_next_command() (bsc#1144333).\n- cifs: fix crash querying symlinks stored as reparse-points (bsc#1144333).\n- cifs: Fix credit calculation for encrypted reads with errors (bsc#1051510, bsc#1144333).\n- cifs: Fix credit calculations in compound mid callback (bsc#1144333).\n- cifs: Fix credit computation for compounded requests (bsc#1144333).\n- cifs: Fix credits calculation for cancelled requests (bsc#1144333).\n- cifs: Fix credits calculations for reads with errors (bsc#1051510, bsc#1144333).\n- cifs: fix credits leak for SMB1 oplock breaks (bsc#1144333).\n- cifs: fix deadlock in cached root handling (bsc#1144333).\n- cifs: Fix DFS cache refresher for DFS links (bsc#1144333).\n- cifs: fix encryption in SMB3.1.1 (bsc#1144333).\n- cifs: Fix encryption/signing (bsc#1144333).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510, bsc#1144333).\n- cifs: Fix error paths in writeback code (bsc#1144333).\n- cifs: fix GlobalMid_Lock bug in cifs_reconnect (bsc#1144333).\n- cifs: fix handle leak in smb2_query_symlink() (bsc#1144333).\n- cifs: fix incorrect handling of smb2_set_sparse() return in smb3_simple_falloc (bsc#1144333).\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171, bsc#1144333).\n- cifs: Fix invalid check in __cifs_calc_signature() (bsc#1144333).\n- cifs: Fix kernel oops when traceSMB is enabled (bsc#1144333).\n- cifs: fix kref underflow in close_shroot() (bsc#1144333).\n- cifs: Fix leaking locked VFS cache pages in writeback retry (bsc#1144333).\n- cifs: Fix lease buffer length error (bsc#1144333).\n- cifs: fix memory leak and remove dead code (bsc#1144333).\n- cifs: fix memory leak in SMB2_open() (bsc#1112894, bsc#1144333).\n- cifs: fix memory leak in SMB2_read (bsc#1144333).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510, bsc#1144333).\n- cifs: fix memory leak of an allocated cifs_ntsd structure (bsc#1144333).\n- cifs: fix memory leak of pneg_inbuf on -EOPNOTSUPP ioctl case (bsc#1144333).\n- cifs: Fix missing put_xid in cifs_file_strict_mmap (bsc#1087092, bsc#1144333).\n- cifs: Fix module dependency (bsc#1144333).\n- cifs: Fix mounts if the client is low on credits (bsc#1144333).\n- cifs: fix NULL deref in SMB2_read (bsc#1085539, bsc#1144333).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: Fix NULL pointer deref on SMB2_tcon() failure (bsc#1071009, bsc#1144333).\n- cifs: Fix NULL ptr deref (bsc#1144333).\n- cifs: fix page reference leak with readv/writev (bsc#1144333).\n- cifs: fix panic in smb2_reconnect (bsc#1144333).\n- cifs: fix parsing of symbolic link error response (bsc#1144333).\n- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542, bsc#1144333).\n- cifs: Fix possible hang during async MTU reads and writes (bsc#1051510, bsc#1144333).\n- cifs: Fix possible oops and memory leaks in async IO (bsc#1144333).\n- cifs: Fix potential OOB access of lock element array (bsc#1051510, bsc#1144333).\n- cifs: Fix read after write for files with read caching (bsc#1051510, bsc#1144333).\n- cifs: fix return value for cifs_listxattr (bsc#1051510, bsc#1144333).\n- cifs: fix rmmod regression in cifs.ko caused by force_sig changes (bsc#1144333).\n- cifs: Fix separator when building path from dentry (bsc#1051510, bsc#1144333).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510, bsc#1144333).\n- cifs: fix signed/unsigned mismatch on aio_read patch (bsc#1144333).\n- cifs: Fix signing for SMB2/3 (bsc#1144333).\n- cifs: Fix slab-out-of-bounds in send_set_info() on SMB2 ACE setting (bsc#1144333).\n- cifs: Fix slab-out-of-bounds when tracing SMB tcon (bsc#1144333).\n- cifs: fix SMB1 breakage (bsc#1144333).\n- cifs: fix smb3_zero_range for Azure (bsc#1144333).\n- cifs: fix smb3_zero_range so it can expand the file-size when required (bsc#1144333).\n- cifs: fix sparse warning on previous patch in a few printks (bsc#1144333).\n- cifs: fix spelling mistake, EACCESS -\u003e EACCES (bsc#1144333).\n- cifs: Fix stack out-of-bounds in smb{2,3}_create_lease_buf() (bsc#1051510, bsc#1144333).\n- cifs: fix strcat buffer overflow and reduce raciness in smb21_set_oplock_level() (bsc#1144333).\n- cifs: Fix to use kmem_cache_free() instead of kfree() (bsc#1144333).\n- cifs: Fix trace command logging for SMB2 reads and writes (bsc#1144333).\n- cifs: fix typo in cifs_dbg (bsc#1144333).\n- cifs: fix typo in debug message with struct field ia_valid (bsc#1144333).\n- cifs: fix uninitialized ptr deref in smb2 signing (bsc#1144333).\n- cifs: Fix use-after-free in SMB2_read (bsc#1144333).\n- cifs: Fix use-after-free in SMB2_write (bsc#1144333).\n- cifs: Fix use after free of a mid_q_entry (bsc#1112903, bsc#1144333).\n- cifs: fix use-after-free of the lease keys (bsc#1144333).\n- cifs: Fix validation of signed data in smb2 (bsc#1144333).\n- cifs: Fix validation of signed data in smb3+ (bsc#1144333).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510, bsc#1144333).\n- cifs: flush before set-info if we have writeable handles (bsc#1144333).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510, bsc#1144333).\n- cifs: handle large EA requests more gracefully in smb2+ (bsc#1144333).\n- cifs: handle netapp error codes (bsc#1136261).\n- cifs: hide unused functions (bsc#1051510, bsc#1144333).\n- cifs: implement v3.11 preauth integrity (bsc#1051510, bsc#1144333).\n- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bsc#1144333).\n- cifs: integer overflow in in SMB2_ioctl() (bsc#1051510, bsc#1144333).\n- cifs: Introduce helper function to get page offset and length in smb_rqst (bsc#1144333).\n- cifs: Introduce offset for the 1st page in data transfer structures (bsc#1144333).\n- cifs: invalidate cache when we truncate a file (bsc#1051510, bsc#1144333).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565, bsc#1144333).\n- cifs: limit amount of data we request for xattrs to CIFSMaxBufSize (bsc#1144333).\n- cifs: Limit memory used by lock request calls to a page (bsc#1144333).\n- cifs_lookup(): cifs_get_inode_...() never returns 0 with *inode left NULL (bsc#1144333).\n- cifs_lookup(): switch to d_splice_alias() (bsc#1144333).\n- cifs: make arrays static const, reduces object code size (bsc#1144333).\n- cifs: Make devname param optional in cifs_compose_mount_options() (bsc#1144333).\n- cifs: make IPC a regular tcon (bsc#1071306, bsc#1144333).\n- cifs: make minor clarifications to module params for cifs.ko (bsc#1144333).\n- cifs: make mknod() an smb_version_op (bsc#1144333).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510, bsc#1144333).\n- cifs: make rmdir() use compounding (bsc#1144333).\n- cifs: make smb_send_rqst take an array of requests (bsc#1144333).\n- cifs: Make sure all data pages are signed correctly (bsc#1144333).\n- cifs: Make use of DFS cache to get new DFS referrals (bsc#1144333).\n- cifs: Mask off signals when sending SMB packets (bsc#1144333).\n- cifs: minor clarification in comments (bsc#1144333).\n- cifs: Minor Kconfig clarification (bsc#1144333).\n- cifs: minor updates to module description for cifs.ko (bsc#1144333).\n- cifs: Move credit processing to mid callbacks for SMB3 (bsc#1144333).\n- cifs: move default port definitions to cifsglob.h (bsc#1144333).\n- cifs: move large array from stack to heap (bsc#1144333).\n- cifs: Move open file handling to writepages (bsc#1144333).\n- cifs: Move unlocking pages from wdata_send_pages() (bsc#1144333).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510, bsc#1144333).\n- cifs: Only free DFS target list if we actually got one (bsc#1144333).\n- cifs: Only send SMB2_NEGOTIATE command on new TCP connections (bsc#1144333).\n- cifs: only wake the thread for the very last PDU in a compound (bsc#1144333).\n- cifs: parse and store info on iface queries (bsc#1144333).\n- cifs: pass flags down into wait_for_free_credits() (bsc#1144333).\n- cifs: Pass page offset for calculating signature (bsc#1144333).\n- cifs: Pass page offset for encrypting (bsc#1144333).\n- cifs: pass page offsets on SMB1 read/write (bsc#1144333).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510, bsc#1144333).\n- cifs: prevent starvation in wait_for_free_credits for multi-credit requests (bsc#1144333).\n- cifs: print CIFSMaxBufSize as part of /proc/fs/cifs/DebugData (bsc#1144333).\n- cifs: Print message when attempting a mount (bsc#1144333).\n- cifs: Properly handle auto disabling of serverino option (bsc#1144333).\n- cifs: protect against server returning invalid file system block size (bsc#1144333).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510, bsc#1144333).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510, bsc#1144333).\n- cifs: push rfc1002 generation down the stack (bsc#1144333).\n- cifs: read overflow in is_valid_oplock_break() (bsc#1144333).\n- cifs: Reconnect expired SMB sessions (bnc#1060662).\n- cifs: refactor and clean up arguments in the reparse point parsing (bsc#1144333).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510, bsc#1144333).\n- cifs: Refactor out cifs_mount() (bsc#1144333).\n- cifs: release auth_key.response for reconnect (bsc#1085536, bsc#1144333).\n- cifs: release cifs root_cred after exit_cifs (bsc#1085536, bsc#1144333).\n- cifs: remove coverity warning in calc_lanman_hash (bsc#1144333).\n- cifs: Remove custom credit adjustments for SMB2 async IO (bsc#1144333).\n- cifs: remove header_preamble_size where it is always 0 (bsc#1144333).\n- cifs: remove redundant duplicated assignment of pointer \u0027node\u0027 (bsc#1144333).\n- cifs: remove rfc1002 hardcoded constants from cifs_discard_remaining_data() (bsc#1144333).\n- cifs: remove rfc1002 header from all SMB2 response structures (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_close_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_create_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_echo_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_flush_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_ioctl_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_lease_ack (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_lock_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_logoff_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_negotiate_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_oplock_break we get from server (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_query_directory_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_query_info_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2 read/write requests (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_sess_setup_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_set_info_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_tree_connect_req (bsc#1144333).\n- cifs: remove rfc1002 header from smb2_tree_disconnect_req (bsc#1144333).\n- cifs: remove set but not used variable \u0027cifs_sb\u0027 (bsc#1144333).\n- cifs: remove set but not used variable \u0027sep\u0027 (bsc#1144333).\n- cifs: remove set but not used variable \u0027server\u0027 (bsc#1144333).\n- cifs: remove set but not used variable \u0027smb_buf\u0027 (bsc#1144333).\n- cifs: remove small_smb2_init (bsc#1144333).\n- cifs: remove smb2_send_recv() (bsc#1144333).\n- cifs: remove struct smb2_hdr (bsc#1144333).\n- cifs: remove struct smb2_oplock_break_rsp (bsc#1144333).\n- cifs: remove the is_falloc argument to SMB2_set_eof (bsc#1144333).\n- cifs: remove unused stats (bsc#1144333).\n- cifs: remove unused value pointed out by Coverity (bsc#1144333).\n- cifs: remove unused variable from SMB2_read (bsc#1144333).\n- cifs: rename and clarify CIFS_ASYNC_OP and CIFS_NO_RESP (bsc#1144333).\n- cifs: Reopen file before get SMB2 MTU credits for async IO (bsc#1144333).\n- cifs: replace a 4 with server-\u003evals-\u003eheader_preamble_size (bsc#1144333).\n- cifs: replace snprintf with scnprintf (bsc#1144333).\n- cifs: Respect reconnect in MTU credits calculations (bsc#1144333).\n- cifs: Respect reconnect in non-MTU credits calculations (bsc#1144333).\n- cifs: Respect SMB2 hdr preamble size in read responses (bsc#1144333).\n- cifs: return correct errors when pinning memory failed for direct I/O (bsc#1144333).\n- cifs: Return -EAGAIN instead of -ENOTSOCK (bsc#1144333).\n- cifs: return -ENODATA when deleting an xattr that does not exist (bsc#1144333).\n- cifs: Return error code when getting file handle for writeback (bsc#1144333).\n- cifs: return error on invalid value written to cifsFYI (bsc#1144333).\n- cifs: Save TTL value when parsing DFS referrals (bsc#1144333).\n- cifs: Select all required crypto modules (bsc#1085536, bsc#1144333).\n- cifs: set mapping error when page writeback fails in writepage or launder_pages (bsc#1144333).\n- cifs: set oparms.create_options rather than or\u0027ing in CREATE_OPEN_BACKUP_INTENT (bsc#1144333).\n- cifs: Set reconnect instance to one initially (bsc#1144333).\n- cifs: set *resp_buf_type to NO_BUFFER on error (bsc#1144333).\n- cifs: Show locallease in /proc/mounts for cifs shares mounted with locallease feature (bsc#1144333).\n- cifs: show \u0027soft\u0027 in the mount options for hard mounts (bsc#1144333).\n- cifs: show the w bit for writeable /proc/fs/cifs/* files (bsc#1144333).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734, bsc#1144333).\n- cifs: Silence uninitialized variable warning (bsc#1144333).\n- cifs: simple stats should always be enabled (bsc#1144333).\n- cifs: simplify code by removing CONFIG_CIFS_ACL ifdef (bsc#1144333). - Update config files.\n- cifs: simplify how we handle credits in compound_send_recv() (bsc#1144333).\n- cifs: Skip any trailing backslashes from UNC (bsc#1144333).\n- cifs: smb2 commands can not be negative, remove confusing check (bsc#1144333).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510, bsc#1144333).\n- cifs: smb2ops: Fix NULL check in smb2_query_symlink (bsc#1144333).\n- cifs: smb2pdu: Fix potential NULL pointer dereference (bsc#1144333).\n- cifs: smbd: Add parameter rdata to smb2_new_read_req (bsc#1144333).\n- cifs: smbd: Add rdma mount option (bsc#1144333).\n- cifs: smbd: Add SMB Direct debug counters (bsc#1144333).\n- cifs: smbd: Add SMB Direct protocol initial values and constants (bsc#1144333).\n- cifs: smbd: Avoid allocating iov on the stack (bsc#1144333).\n- cifs: smbd: avoid reconnect lockup (bsc#1144333).\n- cifs: smbd: Check for iov length on sending the last iov (bsc#1144333).\n- cifs: smbd: depend on INFINIBAND_ADDR_TRANS (bsc#1144333).\n- cifs: smbd: Disable signing on SMB direct transport (bsc#1144333).\n- cifs: smbd: disconnect transport on RDMA errors (bsc#1144333).\n- cifs: smbd: Do not call ib_dereg_mr on invalidated memory registration (bsc#1144333).\n- cifs: smbd: Do not destroy transport on RDMA disconnect (bsc#1144333).\n- cifs: smbd: Do not use RDMA read/write when signing is used (bsc#1144333).\n- cifs: smbd: Dump SMB packet when configured (bsc#1144333).\n- cifs: smbd: Enable signing with smbdirect (bsc#1144333).\n- cifs: smbd: Establish SMB Direct connection (bsc#1144333).\n- cifs: smbd: export protocol initial values (bsc#1144333).\n- cifs: smbd: fix spelling mistake: faield and legnth (bsc#1144333).\n- cifs: smbd: Fix the definition for SMB2_CHANNEL_RDMA_V1_INVALIDATE (bsc#1144333).\n- cifs: smbd: Implement function to create a SMB Direct connection (bsc#1144333).\n- cifs: smbd: Implement function to destroy a SMB Direct connection (bsc#1144333).\n- cifs: smbd: Implement function to receive data via RDMA receive (bsc#1144333).\n- cifs: smbd: Implement function to reconnect to a SMB Direct transport (bsc#1144333).\n- cifs: smbd: Implement function to send data via RDMA send (bsc#1144333).\n- cifs: smbd: Implement RDMA memory registration (bsc#1144333).\n- cifs: smbd: Indicate to retry on transport sending failure (bsc#1144333).\n- cifs: smbd: Introduce kernel config option CONFIG_CIFS_SMB_DIRECT (bsc#1144333).\n- cifs: smbd: Read correct returned data length for RDMA write (SMB read) I/O (bsc#1144333).\n- cifs: smbd: Retry on memory registration failure (bsc#1144333).\n- cifs: smbd: Return EINTR when interrupted (bsc#1144333).\n- cifs: smbd: Set SMB Direct maximum read or write size for I/O (bsc#1144333).\n- cifs: smbd: _smbd_get_connection() can be static (bsc#1144333).\n- cifs: smbd: Support page offset in memory registration (bsc#1144333).\n- cifs: smbd: Support page offset in RDMA recv (bsc#1144333).\n- cifs: smbd: Support page offset in RDMA send (bsc#1144333).\n- cifs: smbd: take an array of reqeusts when sending upper layer data (bsc#1144333).\n- cifs: smbd: Upper layer connects to SMBDirect session (bsc#1144333).\n- cifs: smbd: Upper layer destroys SMB Direct session on shutdown or umount (bsc#1144333).\n- cifs: smbd: Upper layer performs SMB read via RDMA write through memory registration (bsc#1144333).\n- cifs: smbd: Upper layer performs SMB write via RDMA read through memory registration (bsc#1144333).\n- cifs: smbd: Upper layer receives data via RDMA receive (bsc#1144333).\n- cifs: smbd: Upper layer reconnects to SMB Direct session (bsc#1144333).\n- cifs: smbd: Upper layer sends data via RDMA send (bsc#1144333).\n- cifs: smbd: Use the correct DMA direction when sending data (bsc#1144333).\n- cifs: smbd: When reconnecting to server, call smbd_destroy() after all MIDs have been called (bsc#1144333).\n- cifs: smbd: work around gcc -Wmaybe-uninitialized warning (bsc#1144333).\n- cifs: start DFS cache refresher in cifs_mount() (bsc#1144333).\n- cifs: store the leaseKey in the fid on SMB2_open (bsc#1051510, bsc#1144333).\n- cifs: suppress some implicit-fallthrough warnings (bsc#1144333).\n- cifs: track writepages in vfs operation counters (bsc#1144333).\n- cifs: Try to acquire credits at once for compound requests (bsc#1144333).\n- cifs: update calc_size to take a server argument (bsc#1144333).\n- cifs: update init_sg, crypt_message to take an array of rqst (bsc#1144333).\n- cifs: update internal module number (bsc#1144333).\n- cifs: update internal module version number (bsc#1144333).\n- cifs: update internal module version number for cifs.ko to 2.12 (bsc#1144333).\n- cifs: update internal module version number for cifs.ko to 2.14 (bsc#1144333).\n- cifs: update module internal version number (bsc#1144333).\n- cifs: update multiplex loop to handle compounded responses (bsc#1144333).\n- cifs: update receive_encrypted_standard to handle compounded responses (bsc#1144333).\n- cifs: update smb2_calc_size to use smb2_sync_hdr instead of smb2_hdr (bsc#1144333).\n- cifs: update smb2_check_message to handle PDUs without a 4 byte length header (bsc#1144333).\n- cifs: update smb2_queryfs() to use compounding (bsc#1144333).\n- cifs: update __smb_send_rqst() to take an array of requests (bsc#1144333).\n- cifs: use a compound for setting an xattr (bsc#1144333).\n- cifs: use a refcount to protect open/closing the cached file handle (bsc#1144333).\n- cifs: use correct format characters (bsc#1144333).\n- cifs: Use correct packet length in SMB2_TRANSFORM header (bsc#1144333).\n- cifs: Use GFP_ATOMIC when a lock is held in cifs_mount() (bsc#1144333).\n- cifs: Use kmemdup in SMB2_ioctl_init() (bsc#1144333).\n- cifs: Use kmemdup rather than duplicating its implementation in smb311_posix_mkdir() (bsc#1144333).\n- cifs: Use kzfree() to free password (bsc#1144333).\n- cifs: Use offset when reading pages (bsc#1144333).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510, bsc#1144333).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510, bsc#1144333).\n- cifs: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (bsc#1071306, bsc#1144333).\n- cifs: use the correct length when pinning memory for direct I/O for write (bsc#1144333).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510, bsc#1144333).\n- cifs: wait_for_free_credits() make it possible to wait for \u003e=1 credits (bsc#1144333).\n- cifs: we can not use small padding iovs together with encryption (bsc#1144333).\n- cifs: When sending data on socket, pass the correct page offset (bsc#1144333).\n- cifs: zero-range does not require the file is sparse (bsc#1144333).\n- cifs: zero sensitive data when freeing (bsc#1087092, bsc#1144333).\n- cifs: Cleanup some minor endian issues in smb3 rdma (bsc#1144333).\n- clk: add clk_bulk_get accessories (bsc#1144813).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: bcm2835: remove pllb (jsc#SLE-7294).\n- clk: bcm283x: add driver interfacing with Raspberry Pi\u0027s firmware (jsc#SLE-7294).\n- clk: bulk: silently error out on EPROBE_DEFER (bsc#1144718,bsc#1144813).\n- clk: Export clk_bulk_prepare() (bsc#1144813).\n- clk: qoriq: add support for lx2160a ().\n- clk: raspberrypi: register platform device for raspberrypi-cpufreq (jsc#SLE-7294).\n- clk: renesas: cpg-mssr: Fix reset control race condition (bsc#1051510).\n- clk: rockchip: Add 1.6GHz PLL rate for rk3399 (bsc#1144718,bsc#1144813).\n- clk: rockchip: assign correct id for pclk_ddr and hclk_sd in rk3399 (bsc#1144718,bsc#1144813).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- compat_ioctl: pppoe: fix PPPOEIOCSFWD handling (bsc#1051510).\n- Compile nvme.ko as module (bsc#1150846)\n- config: arm64: Remove CONFIG_ARM64_MODULE_CMODEL_LARGE Option removed by patches in bsc#1148219\n- coredump: split pipe command whitespace before expanding template (bsc#1051510).\n- cpufreq: add driver for Raspberry Pi (jsc#SLE-7294).\n- cpufreq: dt: Try freeing static OPPs only if we have added them (jsc#SLE-7294).\n- cpu/speculation: Warn on unsupported mitigations= parameter (bsc#1114279).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Add support for valid authsize values less than 16 (bsc#1051510).\n- crypto: ccp - Fix oops by properly managing allocated structures (bsc#1051510).\n- crypto: ccp - Ignore tag length when decrypting GCM ciphertext (bsc#1051510).\n- crypto: ccp - Ignore unconfigured CCP device on suspend/resume (bnc#1145934).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: ccp - Validate buffer lengths for copy operations (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix skcipher failure due to wrong output IV (bsc#1051510).\n- crypto: virtio - Read crypto services and algorithm masks (jsc#SLE-5844 jsc#SLE-6331 bsc#1145446 LTC#175307).\n- crypto: virtio - Register an algo only if it\u0027s supported (jsc#SLE-5844 jsc#SLE-6331 bsc#1145446 LTC#175307).\n- cx82310_eth: fix a memory leak bug (bsc#1051510).\n- dax: dax_layout_busy_page() should not unmap cow pages (bsc#1148698).\n- devres: always use dev_name() in devm_ioremap_resource() (git fixes).\n- dfs_cache: fix a wrong use of kfree in flush_cache_ent() (bsc#1144333).\n- dma-buf: balance refcount inbalance (bsc#1051510).\n- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- dmaengine: rcar-dmac: Reject zero-length slave DMA requests (bsc#1051510).\n- dm btree: fix order of block initialization in btree_split_beneath (git fixes).\n- dm bufio: fix deadlock with loop device (git fixes).\n- dm cache metadata: Fix loading discard bitset (git fixes).\n- dm crypt: do not overallocate the integrity tag space (git fixes).\n- dm crypt: fix parsing of extended IV arguments (git fixes).\n- dm delay: fix a crash when invalid device is specified (git fixes).\n- dm: fix to_sector() for 32bit (git fixes).\n- dm integrity: change memcmp to strncmp in dm_integrity_ctr (git fixes).\n- dm integrity: correctly calculate the size of metadata area (git fixes).\n- dm integrity: fix a crash due to BUG_ON in __journal_read_write() (git fixes).\n- dm integrity: fix deadlock with overlapping I/O (git fixes).\n- dm integrity: limit the rate of error messages (git fixes).\n- dm kcopyd: always complete failed jobs (git fixes).\n- dm log writes: make sure super sector log updates are written in order (git fixes).\n- dm raid: add missing cleanup in raid_ctr() (git fixes).\n- dm: revert 8f50e358153d (\u0027dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE\u0027) (git fixes).\n- dm space map metadata: fix missing store of apply_bops() return value (git fixes).\n- dm table: fix invalid memory accesses with too high sector number (git fixes).\n- dm table: propagate BDI_CAP_STABLE_WRITES to fix sporadic checksum errors (git fixes).\n- dm thin: fix bug where bio that overwrites thin block ignores FUA (git fixes).\n- dm thin: fix passdown_double_checking_shared_status() (git fixes).\n- dm zoned: fix potential NULL dereference in dmz_do_reclaim() (git fixes).\n- dm zoned: Fix zone report handling (git fixes).\n- dm zoned: fix zone state management race (git fixes).\n- dm zoned: improve error handling in i/o map code (git fixes).\n- dm zoned: improve error handling in reclaim (git fixes).\n- dm zoned: properly handle backing device failure (git fixes).\n- dm zoned: Silence a static checker warning (git fixes).\n- Documentation: Add nospectre_v1 parameter (bsc#1051510).\n- Documentation/networking: fix default_ttl typo in mpls-sysctl (bsc#1051510).\n- Documentation: Update Documentation for iommu.passthrough (bsc#1136039).\n- Do not log confusing message on reconnect by default (bsc#1129664, bsc#1144333).\n- Do not log expected error on DFS referral request (bsc#1051510, bsc#1144333).\n- driver core: Fix use-after-free and double free on glue directory (bsc#1131281).\n- drivers/pps/pps.c: clear offset flags in PPS_SETPARAMS ioctl (bsc#1051510).\n- drivers/rapidio/devices/rio_mport_cdev.c: NUL terminate some strings (bsc#1051510).\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm/amd/display: Always allocate initial connector state state (bsc#1111666).\n- drm/amd/display: Disable ABM before destroy ABM struct (bsc#1111666).\n- drm/amd/display: Fill prescale_params-\u003escale for RGB565 (bsc#1111666).\n- drm/amd/display: fix compilation error (bsc#1111666).\n- drm/amd/display: Fix dc_create failure handling and 666 color depths (bsc#1111666).\n- drm/amd/display: Increase size of audios array (bsc#1111666).\n- drm/amd/display: num of sw i2c/aux engines less than num of connectors (bsc#1145946).\n- drm/amd/display: Only enable audio if speaker allocation exists (bsc#1111666).\n- drm/amd/display: Remove redundant non-zero and overflow check (bsc#1145946).\n- drm/amd/display: use encoder\u0027s engine id to find matched free audio device (bsc#1111666).\n- drm/amd/display: Wait for backlight programming completion in set backlight level (bsc#1111666).\n- drm/amdgpu: Add APTX quirk for Dell Latitude 5495 (bsc#1142635)\n- drm/amdgpu: added support 2nd UVD instance (bsc#1143331).\n- drm/amdgpu:change VEGA booting with firmware loaded by PSP (bsc#1143331).\n- drm/amdgpu: fix a potential information leaking bug (bsc#1111666).\n- drm/amdgpu/psp: move psp version specific function pointers to (bsc#1135642)\n- drm/amdgpu/sriov: Need to initialize the HDP_NONSURFACE_BAStE (bsc#1111666).\n- drm/amdkfd: Fix a potential memory leak (bsc#1111666).\n- drm/amdkfd: Fix sdma queue map issue (bsc#1111666).\n- drm/bridge: lvds-encoder: Fix build error while CONFIG_DRM_KMS_HELPER=m (bsc#1111666).\n- drm/bridge: sii902x: pixel clock unit is 10kHz instead of 1kHz (bsc#1051510).\n- drm/bridge: tc358767: read display_props in get_modes() (bsc#1051510).\n- drm/crc-debugfs: Also sprinkle irqrestore over early exits (bsc#1051510).\n- drm/crc-debugfs: User irqsafe spinlock in drm_crtc_add_crc_entry (bsc#1051510).\n- drm/edid: parse CEA blocks embedded in DisplayID (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1135642)\n- drm/exynos: fix missing decrement of retry counter (bsc#1111666).\n- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)\n- drm/i915: Fix GEN8_MCR_SELECTOR programming (bsc#1111666).\n- drm/i915: Fix HW readout for crtc_clock in HDMI mode (bsc#1111666).\n- drm/i915: Fix the TBT AUX power well enabling (bsc#1111666).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/i915: Fix wrong escape clock divisor init for GLK (bsc#1051510).\n- drm/i915: Fix wrong escape clock divisor init for GLK (bsc#1142635)\n- drm/i915/gvt: fix incorrect cache entry for guest page mapping (bsc#1111666).\n- drm/i915/perf: ensure we keep a reference on the driver (bsc#1051510).\n- drm/i915/perf: ensure we keep a reference on the driver (bsc#1142635)\n- drm/i915/perf: fix ICL perf register offsets (bsc#1111666).\n- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)\n- drm/i915/userptr: Acquire the page lock around set_page_dirty() (bsc#1051510).\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1135642)\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1135642)\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1135642)\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1135642)\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1135642)\n- drm/mediatek: fix unbind functions (bsc#1135642)\n- drm/mediatek: mtk_drm_drv.c: Add of_node_put() before goto (bsc#1111666).\n- drm/mediatek: mtk_drm_drv.c: Add of_node_put() before goto (bsc#1142635)\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1135642)\n- drm/mediatek: use correct device to import PRIME buffers (bsc#1111666).\n- drm/mediatek: use correct device to import PRIME buffers (bsc#1142635)\n- drm/msm: Depopulate platform on probe failure (bsc#1051510).\n- drm: msm: Fix add_gpu_components (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1142635)\n- drm/nouveau: Do not retry infinitely when receiving no data on i2c (bsc#1142635)\n- drm/nouveau: fix memory leak in nouveau_conn_reset() (bsc#1051510).\n- drm/panel: simple: Fix panel_simple_dsi_probe (bsc#1051510).\n- drm/rockchip: Suspend DP late (bsc#1051510).\n- drm/rockchip: Suspend DP late (bsc#1142635)\n- drm: silence variable \u0027conn\u0027 set but not used (bsc#1051510).\n- drm/udl: introduce a macro to convert dev to udl. (bsc#1113722)\n- drm/udl: move to embedding drm device inside udl device. (bsc#1113722)\n- drm/virtio: Add memory barriers for capset cache (bsc#1051510).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1135642)\n- drm/vmwgfx: fix memory leak when too many retries have occurred (bsc#1051510).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1135642)\n- Drop an ASoC fix that was reverted in 4.14.y stable\n- eCryptfs: fix a couple type promotion bugs (bsc#1051510).\n- EDAC/amd64: Add Family 17h Model 30h PCI IDs (bsc#1112178).\n- EDAC, amd64: Add Family 17h, models 10h-2fh support (bsc#1112178).\n- EDAC/amd64: Adjust printed chip select sizes when interleaved (bsc#1131489).\n- EDAC/amd64: Cache secondary Chip Select registers (bsc#1131489).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1131489).\n- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1131489).\n- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1131489).\n- EDAC/amd64: Recognize DRAM device type ECC capability (bsc#1131489).\n- EDAC/amd64: Recognize x16 symbol size (bsc#1131489).\n- EDAC/amd64: Set maximum channel layer size depending on family (bsc#1131489).\n- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1131489).\n- EDAC/amd64: Support more than two controllers for chip selects handling (bsc#1131489).\n- EDAC/amd64: Support more than two Unified Memory Controllers (bsc#1131489).\n- EDAC/amd64: Use a macro for iterating over Unified Memory Controllers (bsc#1131489).\n- EDAC: Fix global-out-of-bounds write when setting edac_mc_poll_msec (bsc#1114279).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- efi/bgrt: Drop BGRT status field reserved bits check (bsc#1051510).\n- ehea: Fix a copy-paste err in ehea_init_port_res (bsc#1051510).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- ext4: use jbd2_inode dirty range scoping (bsc#1148616).\n- firmware: raspberrypi: register clk device (jsc#SLE-7294).\n- firmware: ti_sci: Always request response from firmware (bsc#1051510).\n- Fix encryption labels and lengths for SMB3.1.1 (bsc#1085536, bsc#1144333).\n- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bsc#1144333).\n- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- Fix match_server check to allow for auto dialect negotiate (bsc#1144333).\n- Fix SMB3.1.1 guest authentication to Samba (bsc#1085536, bsc#1144333).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510, bsc#1144333).\n- fix struct ufs_req removal of unused field (git-fixes).\n- Fix warning messages when mounting to older servers (bsc#1144333).\n- floppy: fix invalid pointer dereference in drive_name (bsc#1111666).\n- floppy: fix out-of-bounds read in next_valid_format (bsc#1111666).\n- floppy: fix usercopy direction (bsc#1111666).\n- fs/cifs/cifsacl.c Fixes typo in a comment (bsc#1144333).\n- fs/cifs: cifsssmb: Change return type of convert_ace_to_cifs_ace (bsc#1144333).\n- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bsc#1144333).\n- fs/cifs: Drop unlikely before IS_ERR(_OR_NULL) (bsc#1144333).\n- fs/cifs: fix uninitialised variable warnings (bsc#1144333).\n- fs/cifs: Kconfig: pedantic formatting (bsc#1144333).\n- fs/cifs: Replace _free_xid call in cifs_root_iget function (bsc#1144333).\n- fs/cifs: require sha512 (bsc#1051510, bsc#1144333).\n- fs/cifs: Simplify ib_post_(send|recv|srq_recv)() calls (bsc#1144333).\n- fs/cifs/smb2pdu.c: fix buffer free in SMB2_ioctl_free (bsc#1144333).\n- fs/cifs: suppress a string overflow warning (bsc#1144333).\n- fs/*/Kconfig: drop links to 404-compliant http://acl.bestbits.at (bsc#1144333).\n- fsl/fman: Use GFP_ATOMIC in {memac,tgec}_add_hash_mac_address() (bsc#1051510).\n- fs/xfs: Fix return code of xfs_break_leased_layouts() (bsc#1148031).\n- fs/xfs: xfs_log: Do not use KM_MAYFAIL at xfs_log_reserve() (bsc#1148033).\n- ftrace: Check for empty hash and comment the race with registering probes (bsc#1149418).\n- ftrace: Check for successful allocation of hash (bsc#1149424).\n- ftrace: Fix NULL pointer dereference in t_probe_next() (bsc#1149413).\n- gpio: Fix build error of function redefinition (bsc#1051510).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpio: gpio-omap: add check for off wake capable gpios (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: fix incorrect IRQ requesting of an active-low lineevent (bsc#1051510).\n- gpiolib: never report open-drain/source lines as \u0027input\u0027 to user-space (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpio: mxs: Get rid of external API call (bsc#1051510).\n- gpio: omap: ensure irq is enabled before wakeup (bsc#1051510).\n- gpio: pxa: handle corner case of unprobed device (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1142635)\n- HID: Add 044f:b320 ThrustMaster, Inc. 2 in 1 DT (bsc#1051510).\n- HID: Add quirk for HP X1200 PIXART OEM mouse (bsc#1051510).\n- HID: cp2112: prevent sleeping function called from invalid context (bsc#1051510).\n- HID: hiddev: avoid opening a disconnected device (bsc#1051510).\n- HID: hiddev: do cleanup in failure of opening a device (bsc#1051510).\n- HID: holtek: test for sanity of intfdata (bsc#1051510).\n- HID: sony: Fix race condition between rumble and device remove (bsc#1051510).\n- HID: wacom: Correct distance scale for 2nd-gen Intuos devices (bsc#1142635).\n- HID: wacom: correct misreported EKR ring values (bsc#1142635).\n- HID: wacom: fix bit shift for Cintiq Companion 2 (bsc#1051510).\n- hpet: Fix division by zero in hpet_time_div() (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (nct6775) Fix register address and added missed tolerance for nct6106 (bsc#1051510).\n- hwmon: (nct7802) Fix wrong detection of in4 presence (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).\n- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).\n- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).\n- i2c: qup: fixed releasing dma without flush operation completion (bsc#1051510).\n- i40e: Add support for X710 device (bsc#1151067).\n- ia64: Get rid of iommu_pass_through (bsc#1136039).\n- IB/mlx5: Fix MR registration flow to use UMR properly (bsc#1093205 bsc#1145678).\n- ibmveth: Convert multicast list size for little-endian system (bsc#1061843).\n- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).\n- ibmvnic: Unmap DMA address of TX descriptor buffers after use (bsc#1146351 ltc#180726).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- igmp: fix memory leak in igmpv3_del_delrec() (networking-stable-19_07_25).\n- iio: adc: max9611: Fix misuse of GENMASK macro (bsc#1051510).\n- iio: adc: max9611: Fix temperature reading in probe (bsc#1051510).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: iio-utils: Fix possible incorrect mask calculation (bsc#1051510).\n- Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510, bsc#1144333).\n- include/linux/bitops.h: sanitize rotate primitives (git fixes).\n- Input: alps - do not handle ALPS cs19 trackpoint-only device (bsc#1051510).\n- Input: alps - fix a mismatch between a condition check and its comment (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- Input: iforce - add sanity checks (bsc#1051510).\n- Input: kbtab - sanity check for endpoint type (bsc#1051510).\n- Input: synaptics - enable RMI mode for HP Spectre X360 (bsc#1051510).\n- Input: synaptics - whitelist Lenovo T580 SMBus intertouch (bsc#1051510).\n- Input: trackpoint - only expose supported controls for Elan, ALPS and NXP (bsc#1051510).\n- intel_th: pci: Add Ice Lake NNPI support (bsc#1051510).\n- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).\n- intel_th: pci: Add Tiger Lake support (bsc#1051510).\n- iommu: Add helpers to set/get default domain type (bsc#1136039).\n- iommu/amd: Add support for X2APIC IOMMU interrupts (bsc#1145010).\n- iommu/amd: Fix race in increase_address_space() (bsc#1150860).\n- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).\n- iommu/amd: Move iommu_init_pci() to .init section (bsc#1149105).\n- iommu/amd: Request passthrough mode from IOMMU core (bsc#1136039).\n- iommu: Disable passthrough mode when SME is active (bsc#1136039).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu/dma: Handle SG length overflow better (bsc#1146084).\n- iommu: Do not use sme_active() in generic code (bsc#1151661).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).\n- iommu/iova: Remove stale cached32_node (bsc#1145018).\n- iommu: Print default domain type on boot (bsc#1136039).\n- iommu: Remember when default domain type was set on kernel command line (bsc#1136039).\n- iommu: Set default domain type at runtime (bsc#1136039).\n- iommu: Use Functions to set default domain type in iommu_set_def_domain_type() (bsc#1136039).\n- iommu/vt-d: Request passthrough mode from IOMMU core (bsc#1136039).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipip: validate header length in ipip_tunnel_xmit (git-fixes).\n- ipv4: do not set IPv6 only flags to IPv4 addresses (networking-stable-19_07_25).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- irqchip/gic-v2m: Add support for Amazon Graviton variant of GICv3+GICv2m (SLE-9332).\n- irqchip/gic-v3-its: fix build warnings (bsc#1144880).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- isdn: hfcsusb: checking idx of ep configuration (bsc#1051510).\n- isdn: hfcsusb: Fix mISDN driver crash caused by transfer buffer on the stack (bsc#1051510).\n- isdn: mISDN: hfcsusb: Fix possible null-pointer dereferences in start_isoc_chain() (bsc#1051510).\n- iversion: add a routine to update a raw value with a larger one (bsc#1148133).\n- iwlwifi: dbg: split iwl_fw_error_dump to two functions (bsc#1119086).\n- iwlwifi: do not unmap as page memory that was mapped as single (bsc#1051510).\n- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).\n- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434).\n- iwlwifi: mvm: do not send GEO_TX_POWER_LIMIT on version \u003c 41 (bsc#1142635).\n- iwlwifi: mvm: fix an out-of-bound access (bsc#1051510).\n- iwlwifi: mvm: fix version check for GEO_TX_POWER_LIMIT support (bsc#1142635).\n- iwlwifi: pcie: do not service an interrupt that was masked (bsc#1142635).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1142635).\n- ixgbe: fix possible deadlock in ixgbe_service_task() (bsc#1113994).\n- jbd2: flush_descriptor(): Do not decrease buffer head\u0027s ref count (bsc#1143843).\n- jbd2: introduce jbd2_inode dirty range scoping (bsc#1148616).\n- kABI: Fix kABI for \u0027struct amd_iommu\u0027 (bsc#1145010).\n- kABI: Fix kABI for x86 pci-dma code (bsc#1136039).\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device\u0027s struct (bsc#1051510). fixes kABI\n- KABI protect struct vmem_altmap (bsc#1150305).\n- kasan: remove redundant initialization of variable \u0027real_size\u0027 (git fixes).\n- kconfig/[mn]conf: handle backspace (^H) key (bsc#1051510).\n- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).\n- kvm: arm64: Fix caching of host MDCR_EL2 value (bsc#1133021).\n- kvm: arm/arm64: Close VMID generation race (bsc#1133021).\n- kvm: arm/arm64: Convert kvm_host_cpu_state to a static per-cpu allocation (bsc#1133021).\n- kvm: arm/arm64: Drop resource size check for GICV window (bsc#1133021).\n- kvm: arm/arm64: Fix lost IRQs from emulated physcial timer when blocked (bsc#1133021).\n- kvm: arm/arm64: Fix VMID alloc race by reverting to lock-less (bsc#1133021).\n- kvm: arm/arm64: Handle CPU_PM_ENTER_FAILED (bsc#1133021).\n- kvm: arm/arm64: Reduce verbosity of KVM init log (bsc#1133021).\n- kvm: arm/arm64: Set dist-\u003espis to NULL after kfree (bsc#1133021).\n- kvm: arm/arm64: Skip updating PMD entry if no change (bsc#1133021).\n- kvm: arm/arm64: Skip updating PTE entry if no change (bsc#1133021).\n- kvm: arm/arm64: vgic: Add missing irq_lock to vgic_mmio_read_pending (bsc#1133021).\n- kvm: arm/arm64: vgic: Fix kvm_device leak in vgic_its_destroy (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Fix potential overrun in vgic_copy_lpi_list (bsc#1133021).\n- kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3 (bsc#1133021).\n- kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init (bsc#1133021).\n- kvm/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel (bsc#1133021).\n- kvm: Fix leak vCPU\u0027s VMCS value into other pCPU (bsc#1145388).\n- kvm: LAPIC: Fix pending interrupt in IRR blocked by software disable LAPIC (bsc#1145408).\n- kvm: mmu: Fix overlap between public and private memslots (bsc#1133021).\n- kvm: nVMX: allow setting the VMFUNC controls MSR (bsc#1145389).\n- kvm: nVMX: do not use dangling shadow VMCS after guest reset (bsc#1145390).\n- kvm: nVMX: Remove unnecessary sync_roots from handle_invept (bsc#1145391).\n- kvm: nVMX: Use adjusted pin controls for vmcs02 (bsc#1145392).\n- kvm: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- kvm: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- kvm: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- kvm: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix CR0 setting in TM emulation (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- kvm: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- kvm: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- kvm: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- kvm: Reject device ioctls from processes other than the VM\u0027s creator (bsc#1133021).\n- kvm: s390: add debug logging for cpu model subfunctions (jsc#SLE-6240).\n- kvm: s390: add deflate conversion facilty to cpu model (jsc#SLE-6240).\n- kvm: s390: add enhanced sort facilty to cpu model (jsc#SLE-6240 ).\n- kvm: s390: add MSA9 to cpumodel (jsc#SLE-6240).\n- kvm: s390: add vector BCD enhancements facility to cpumodel (jsc#SLE-6240).\n- kvm: s390: add vector enhancements facility 2 to cpumodel (jsc#SLE-6240).\n- kvm: s390: enable MSA9 keywrapping functions depending on cpu model (jsc#SLE-6240).\n- kvm: s390: implement subfunction processor calls (jsc#SLE-6240 ).\n- kvm: s390: provide query function for instructions returning 32 byte (jsc#SLE-6240).\n- kvm: VMX: Always signal #GP on WRMSR to MSR_IA32_CR_PAT with bad value (bsc#1145393).\n- kvm: VMX: check CPUID before allowing read/write of IA32_XSS (bsc#1145394).\n- kvm: VMX: Fix handling of #MC that occurs during VM-Entry (bsc#1145395).\n- kvm: x86: degrade WARN to pr_warn_ratelimited (bsc#1145409).\n- kvm: x86: Do not update RIP or do single-step on faulting emulation (bsc#1149104).\n- kvm: x86: fix backward migration with async_PF (bsc#1146074).\n- kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs (bsc#1134881 bsc#1134882).\n- kvm: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- kvm: x86: Unconditionally enable irqs in guest context (bsc#1145396).\n- kvm: x86/vPMU: refine kvm_pmu err msg when event creation failed (bsc#1145397).\n- lan78xx: Fix memory leaks (bsc#1051510).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- libata: add SG safety checks in SFF pio transfers (bsc#1051510).\n- libata: do not request sense data on !ZAC ATA devices (bsc#1051510).\n- libata: have ata_scsi_rw_xlat() fail invalid passthrough requests (bsc#1051510).\n- libata: zpodd: Fix small read overflow in zpodd_get_mech_type() (bsc#1051510).\n- libceph: add ceph_decode_entity_addr (bsc#1148133 bsc#1136682).\n- libceph: add osd_req_op_extent_osd_data_bvecs() (bsc#1141450).\n- libceph: ADDR2 support for monmap (bsc#1148133 bsc#1136682).\n- libceph: allow ceph_buffer_put() to receive a NULL ceph_buffer (bsc#1148133).\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: correctly decode ADDR2 addresses in incremental OSD maps (bsc#1148133 bsc#1136682).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: fix PG split vs OSD (re)connect race (bsc#1148133).\n- libceph: fix sa_family just after reading address (bsc#1148133 bsc#1136682).\n- libceph: fix unaligned accesses in ceph_entity_addr handling (bsc#1136682).\n- libceph: fix watch_item_t decoding to use ceph_decode_entity_addr (bsc#1148133 bsc#1136682).\n- libceph: handle zero-length data items (bsc#1141450).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce BVECS data type (bsc#1141450).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: make ceph_pr_addr take an struct ceph_entity_addr pointer (bsc#1136682).\n- libceph: preallocate message data items (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: new bio handling code (aka do not clone bios) (bsc#1141450).\n- libceph: rename ceph_encode_addr to ceph_encode_banner_addr (bsc#1148133 bsc#1136682).\n- libceph: switch osdmap decoding to use ceph_decode_entity_addr (bsc#1148133 bsc#1136682).\n- libceph: turn on CEPH_FEATURE_MSG_ADDR2 (bsc#1148133 bsc#1136682).\n- libceph: use single request data item for cmp/setxattr (bsc#1139101).\n- libceph: use TYPE_LEGACY for entity addrs instead of TYPE_NONE (bsc#1148133 bsc#1136682).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).\n- libnvdimm/pfn: Store correct value of npfns in namespace superblock (bsc#1146381 ltc#180720).\n- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).\n- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).\n- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).\n- livepatch: Nullify obj-\u003emod in klp_module_coming()\u0027s error path (bsc#1071995).\n- loop: set PF_MEMALLOC_NOIO for the worker thread (git fixes).\n- lpfc: fix 12.4.0.0 GPF at boot (bsc#1148308).\n- mac80211: Correctly set noencrypt for PAE frames (bsc#1111666).\n- mac80211: Do not memset RXCB prior to PAE intercept (bsc#1111666).\n- mac80211: do not warn about CW params when not using them (bsc#1051510).\n- mac80211: do not WARN on short WMM parameters from AP (bsc#1051510).\n- mac80211: fix possible memory leak in ieee80211_assign_beacon (bsc#1142635).\n- mac80211: fix possible sta leak (bsc#1051510).\n- mac80211_hwsim: Fix possible null-pointer dereferences in hwsim_dump_radio_nl() (bsc#1111666).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- macsec: fix checksumming after decryption (bsc#1051510).\n- macsec: fix use-after-free of skb during RX (bsc#1051510).\n- macsec: let the administrator set UP state even if lowerdev is down (bsc#1051510).\n- macsec: update operstate when lower device changes (bsc#1051510).\n- mailbox: handle failed named mailbox channel request (bsc#1051510).\n- md: add mddev-\u003epers to avoid potential NULL pointer dereference (git fixes).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- md/raid: raid5 preserve the writeback action after the parity check (git fixes).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: au0828: fix null dereference in error path (bsc#1051510).\n- media: coda: fix last buffer handling in V4L2_ENC_CMD_STOP (bsc#1051510).\n- media: coda: fix mpeg2 sequence number handling (bsc#1051510).\n- media: coda: increment sequence offset for the last returned frame (bsc#1051510).\n- media: coda: Remove unbalanced and unneeded mutex unlock (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb: usb: fix use after free in dvb_usb_device_exit (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device\u0027s struct (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: hdpvr: fix locking and a missing msleep (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: media_device_enum_links32: clean a reserved field (bsc#1051510).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: pvrusb2: use a different format for warnings (bsc#1051510).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: Revert \u0027[media] marvell-ccic: reset ccic phy when stop streaming for stability\u0027 (bsc#1051510).\n- media: spi: IR LED: add missing of table registration (bsc#1051510).\n- media: staging: media: davinci_vpfe: - Fix for memory leak if decoder initialization fails (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- media: vpss: fix a potential NULL pointer dereference (bsc#1051510).\n- media: wl128x: Fix some error handling in fm_v4l2_init_video_device() (bsc#1051510).\n- mfd: arizona: Fix undefined behavior (bsc#1051510).\n- mfd: core: Set fwnode for created devices (bsc#1051510).\n- mfd: hi655x-pmic: Fix missing return value check for devm_regmap_init_mmio_clk (bsc#1051510).\n- mfd: intel-lpss: Add Intel Comet Lake PCI IDs (jsc#SLE-4875).\n- mic: avoid statically declaring a \u0027struct device\u0027 (bsc#1051510).\n- mlxsw: spectrum: Fix error path in mlxsw_sp_module_init() (bsc#1112374).\n- mm: add filemap_fdatawait_range_keep_errors() (bsc#1148616).\n- mmc: cavium: Add the missing dma unmap when the dma has finished (bsc#1051510).\n- mmc: cavium: Set the correct dma max segment size for mmc_host (bsc#1051510).\n- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).\n- mmc: dw_mmc: Fix occasional hang after tuning on eMMC (bsc#1051510).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-at91: add quirk for broken HS200 (bsc#1051510).\n- mmc: sdhci-pci: Add support for Intel CML (jsc#SLE-4875).\n- mmc: sdhci-pci: Add support for Intel ICP (jsc#SLE-4875).\n- mmc: sdhci-pci: Fix BYT OCP setting (bsc#1051510).\n- mm: do not stall register_shrinker() (bsc#1104902, VM Performance).\n- mm/hmm: fix bad subpage pointer in try_to_unmap_one (bsc#1148202, HMM, VM Functionality).\n- mm/hotplug: fix offline undo_isolate_page_range() (bsc#1148196, VM Functionality).\n- mm/list_lru.c: fix memory leak in __memcg_init_list_lru_node (bsc#1148379, VM Functionality).\n- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).\n- mm/memory.c: recheck page table entry with page table lock held (bsc#1148363, VM Functionality).\n- mm/migrate.c: initialize pud_entry in migrate_vma() (bsc#1148198, HMM, VM Functionality).\n- mm/mlock.c: change count_mm_mlocked_page_nr return type (bsc#1148527, VM Functionality).\n- mm/mlock.c: mlockall error for flag MCL_ONFAULT (bsc#1148527, VM Functionality).\n- mm: move MAP_SYNC to asm-generic/mman-common.h (bsc#1148297).\n- mm/page_alloc.c: fix calculation of pgdat-\u003enr_zones (bsc#1148192, VM Functionality).\n- mm: page_mapped: do not assume compound page is huge or THP (bsc#1148574, VM Functionality).\n- mm, page_owner: handle THP splits correctly (bsc#1149197, VM Debugging Functionality).\n- mm/vmalloc: Sync unmappings in __purge_vmap_area_lazy() (bsc#1118689).\n- mm/vmscan.c: fix trying to reclaim unevictable LRU page (bsc#1149214, VM Functionality).\n- mm, vmscan: do not special-case slab reclaim when watermarks are boosted (git fixes (mm/vmscan)).\n- move a few externs to smbdirect.h to eliminate warning (bsc#1144333).\n- move core networking kabi patches to the end of the section\n- move irq_data_get_effective_affinity_mask prior the sorted section\n- mpls: fix warning with multi-label encap (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- nbd: replace kill_bdev() with __invalidate_device() again (git fixes).\n- Negotiate and save preferred compression algorithms (bsc#1144333).\n- net/9p: include trans_common.h to fix missing prototype warning (bsc#1051510).\n- net: bcmgenet: use promisc for unsupported filters (networking-stable-19_07_25).\n- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).\n- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).\n- net: bridge: mcast: fix stale ipv6 hdr pointer when handling v6 query (networking-stable-19_07_25).\n- net: bridge: mcast: fix stale nsrcs pointer in igmp3/mld2 report handling (networking-stable-19_07_25).\n- net: bridge: stp: do not cache eth dest pointer before skb pull (networking-stable-19_07_25).\n- net: dsa: mv88e6xxx: wait after reset deactivation (networking-stable-19_07_25).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1139020 bsc#1139021).\n- net: ena: add good checksum counter (bsc#1139020 bsc#1139021).\n- net: ena: add handling of llq max tx burst size (bsc#1139020 bsc#1139021).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1139020 bsc#1139021).\n- net: ena: add newline at the end of pr_err prints (bsc#1139020 bsc#1139021).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1139020 bsc#1139021).\n- net: ena: allow automatic fallback to polling mode (bsc#1139020 bsc#1139021).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1139020 bsc#1139021).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1139020 bsc#1139021).\n- net: ena: enable negotiating larger Rx ring size (bsc#1139020 bsc#1139021).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1139020 bsc#1139021).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1139020 bsc#1139021).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1139020 bsc#1139021).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1139020 bsc#1139021).\n- net: ena: fix incorrect test of supported hash function (bsc#1139020 bsc#1139021).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1139020 bsc#1139021).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1139020 bsc#1139021).\n- net: ena: gcc 8: fix compilation warning (bsc#1139020 bsc#1139021).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1139020 bsc#1139021).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1139020 bsc#1139021).\n- net: ena: optimise calculations for CQ doorbell (bsc#1139020 bsc#1139021).\n- net: ena: remove inline keyword from functions in *.c (bsc#1139020 bsc#1139021).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1139020 bsc#1139021).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1139020 bsc#1139021).\n- net: ena: use dev_info_once instead of static variable (bsc#1139020 bsc#1139021).\n- net: fix bpf_xdp_adjust_head regression for generic-XDP (bsc#1109837).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: Fix netdev_WARN_ONCE macro (git-fixes).\n- net: hns3: add a check to pointer in error_detected and slot_reset (bsc#1104353).\n- net: hns3: add all IMP return code (bsc#1104353).\n- net: hns3: add aRFS support for PF (bsc#1104353).\n- net: hns3: add Asym Pause support to fix autoneg problem (bsc#1104353).\n- net: hns3: add check to number of buffer descriptors (bsc#1104353).\n- net: hns3: add default value for tc_size and tc_offset (bsc#1104353).\n- net: hns3: add exception handling when enable NIC HW error interrupts (bsc#1104353).\n- net: hns3: add handling of two bits in MAC tunnel interrupts (bsc#1104353).\n- net: hns3: add handshake with hardware while doing reset (bsc#1104353).\n- net: hns3: Add missing newline at end of file (bsc#1104353 ).\n- net: hns3: add opcode about query and clear RAS \u0026 MSI-X to special opcode (bsc#1104353).\n- net: hns3: add recovery for the H/W errors occurred before the HNS dev initialization (bsc#1104353).\n- net: hns3: add some error checking in hclge_tm module (bsc#1104353).\n- net: hns3: add support for dump firmware statistics by debugfs (bsc#1104353).\n- net: hns3: adjust hns3_uninit_phy()\u0027s location in the hns3_client_uninit() (bsc#1104353).\n- net: hns3: bitwise operator should use unsigned type (bsc#1104353).\n- net: hns3: change SSU\u0027s buffer allocation according to UM (bsc#1104353).\n- net: hns3: check msg_data before memcpy in hclgevf_send_mbx_msg (bsc#1104353).\n- net: hns3: clear restting state when initializing HW device (bsc#1104353).\n- net: hns3: code optimizaition of hclge_handle_hw_ras_error() (bsc#1104353).\n- net: hns3: delay and separate enabling of NIC and ROCE HW errors (bsc#1104353).\n- net: hns3: delay ring buffer clearing during reset (bsc#1104353 ).\n- net: hns3: delay setting of reset level for hw errors until slot_reset is called (bsc#1104353).\n- net: hns3: delete the redundant user NIC codes (bsc#1104353 ).\n- net: hns3: do not configure new VLAN ID into VF VLAN table when it\u0027s full (bsc#1104353).\n- net: hns3: enable broadcast promisc mode when initializing VF (bsc#1104353).\n- net: hns3: enable DCB when TC num is one and pfc_en is non-zero (bsc#1104353).\n- net: hns3: extract handling of mpf/pf msi-x errors into functions (bsc#1104353).\n- net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector (bsc#1104353).\n- net: hns3: fix a statistics issue about l3l4 checksum error (bsc#1104353).\n- net: hns3: fix avoid unnecessary resetting for the H/W errors which do not require reset (bsc#1104353).\n- net: hns3: fix a -Wformat-nonliteral compile warning (bsc#1104353).\n- net: hns3: fix compile warning without CONFIG_RFS_ACCEL (bsc#1104353).\n- net: hns3: fix dereference of ae_dev before it is null checked (bsc#1104353).\n- net: hns3: fixes wrong place enabling ROCE HW error when loading (bsc#1104353).\n- net: hns3: fix flow control configure issue for fibre port (bsc#1104353).\n- net: hns3: fix for dereferencing before null checking (bsc#1104353).\n- net: hns3: fix for skb leak when doing selftest (bsc#1104353 ).\n- net: hns3: fix __QUEUE_STATE_STACK_XOFF not cleared issue (bsc#1104353).\n- net: hns3: fix race conditions between reset and module loading \u0026 unloading (bsc#1104353).\n- net: hns3: fix some coding style issues (bsc#1104353 ).\n- net: hns3: fix VLAN filter restore issue after reset (bsc#1104353).\n- net: hns3: fix wrong size of mailbox responding data (bsc#1104353).\n- net: hns3: free irq when exit from abnormal branch (bsc#1104353 ).\n- net: hns3: handle empty unknown interrupt (bsc#1104353 ).\n- net: hns3: initialize CPU reverse mapping (bsc#1104353 ).\n- net: hns3: log detail error info of ROCEE ECC and AXI errors (bsc#1104353).\n- net: hns3: make HW GRO handling compliant with SW GRO (bsc#1104353).\n- net: hns3: modify handling of out of memory in hclge_err.c (bsc#1104353).\n- net: hns3: modify hclge_init_client_instance() (bsc#1104353 ).\n- net: hns3: modify hclgevf_init_client_instance() (bsc#1104353 ).\n- net: hns3: optimize the CSQ cmd error handling (bsc#1104353 ).\n- net: hns3: process H/W errors occurred before HNS dev initialization (bsc#1104353).\n- net: hns3: refactor hns3_get_new_int_gl function (bsc#1104353 ).\n- net: hns3: refactor PF/VF RSS hash key configuration (bsc#1104353).\n- net: hns3: refine the flow director handle (bsc#1104353 ).\n- net: hns3: remove override_pci_need_reset (bsc#1104353 ).\n- net: hns3: remove redundant core reset (bsc#1104353 ).\n- net: hns3: remove RXD_VLD check in hns3_handle_bdinfo (bsc#1104353).\n- net: hns3: remove setting bit of reset_requests when handling mac tunnel interrupts (bsc#1104353).\n- net: hns3: remove unused linkmode definition (bsc#1104353 ).\n- net: hns3: remove VF VLAN filter entry inexistent warning print (bsc#1104353).\n- net: hns3: replace numa_node_id with numa_mem_id for buffer reusing (bsc#1104353).\n- net: hns3: re-schedule reset task while VF reset fail (bsc#1104353).\n- net: hns3: set default value for param \u0027type\u0027 in hclgevf_bind_ring_to_vector (bsc#1104353).\n- net: hns3: set maximum length to resp_data_len for exceptional case (bsc#1104353).\n- net: hns3: set ops to null when unregister ad_dev (bsc#1104353 ).\n- net: hns3: set the port shaper according to MAC speed (bsc#1104353).\n- net: hns3: small changes for magic numbers (bsc#1104353 ).\n- net: hns3: some changes of MSI-X bits in PPU(RCB) (bsc#1104353 ).\n- net: hns3: some modifications to simplify and optimize code (bsc#1104353).\n- net: hns3: some variable modification (bsc#1104353).\n- net: hns3: stop schedule reset service while unloading driver (bsc#1104353).\n- net: hns3: sync VLAN filter entries when kill VLAN ID failed (bsc#1104353).\n- net: hns3: trigger VF reset if a VF had an over_8bd_nfe_err (bsc#1104353).\n- net: hns3: typo in the name of a constant (bsc#1104353 ).\n- net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has registered (bsc#1104353).\n- net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has registered (bsc#1104353).\n- net: hns3: use macros instead of magic numbers (bsc#1104353 ).\n- net: hns: add support for vlan TSO (bsc#1104353).\n- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).\n- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net: Introduce netdev_*_once functions (networking-stable-19_07_25).\n- net: make skb_dst_force return true when dst is refcounted (networking-stable-19_07_25).\n- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bsc#1145678).\n- net/mlx5e: always initialize frag-\u003elast_in_page (bsc#1103990 ).\n- net/mlx5e: IPoIB, Add error path in mlx5_rdma_setup_rn (networking-stable-19_07_25).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/mlx5: Fix modify_cq_in alignment (bsc#1103990).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net: mvpp2: Do not check for 3 consecutive Idle frames for 10G links (bsc#1119113).\n- net: neigh: fix multiple neigh timer scheduling (networking-stable-19_07_25).\n- net: openvswitch: fix csum updates for MPLS actions (networking-stable-19_07_25).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net: phylink: Fix flow control for fixed-link (bsc#1119113 ).\n- net: remove duplicate fetch in sock_getsockopt (networking-stable-19_07_02).\n- netrom: fix a memory leak in nr_rx_frame() (networking-stable-19_07_25).\n- netrom: hold sock when setting skb-\u003edestructor (networking-stable-19_07_25).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net_sched: unset TCQ_F_CAN_BYPASS when adding filters (networking-stable-19_07_25).\n- net: sched: verify that q!=NULL before setting q-\u003eflags (git-fixes).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net: stmmac: fixed new system time seconds value calculation (networking-stable-19_07_02).\n- net: stmmac: set IC bit when transmitting frames with HW timestamp (networking-stable-19_07_02).\n- net: usb: pegasus: fix improper read if get_registers() fail (bsc#1051510).\n- nfc: fix potential illegal memory access (bsc#1051510).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- NFS: Cleanup if nfs_match_client is interrupted (bsc#1134291).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix a double unlock from nfs_match,get_client (bsc#1134291).\n- NFS: Fix regression whereby fscache errors are appearing on \u0027nofsc\u0027 mounts (git-fixes).\n- NFS: Fix the inode request accounting when pages have subrequests (bsc#1140012).\n- NFS: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (git-fixes).\n- NFS: make nfs_match_client killable (bsc#1134291).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4: Check the return value of update_open_stateid() (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we\u0027re sending a truncate (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- nilfs2: do not use unexported cpu_to_le32()/le32_to_cpu() in uapi header (git fixes).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- null_blk: complete requests from -\u003etimeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme: cancel request synchronously (bsc#1145661).\n- nvme: change locking for the per-subsystem controller list (bsc#1142541).\n- nvme-core: Fix extra device_put() call on error path (bsc#1142541).\n- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).\n- nvme-fc: fix module unloads while lports still pending (bsc#1150033).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: fix possible use-after-free in connect error flow (bsc#1139500)\n- nvme: fix possible use-after-free in connect error flow (bsc#1139500, bsc#1140426)\n- nvme: introduce NVME_QUIRK_IGNORE_DEV_SUBNQN (bsc#1146938).\n- nvme-multipath: fix ana log nsid lookup when nsid is not found (bsc#1141554).\n- nvme-multipath: relax ANA state check (bsc#1123105).\n- nvme-multipath: revalidate nvme_ns_head gendisk in nvme_validate_ns (bsc#1120876).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from -\u003etimeout (bsc#1142076).\n- nvme: Return BLK_STS_TARGET if the DNR bit is set (bsc#1142076).\n- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-tcp: fix timeout handler (bsc#1149446).\n- nvme: wait until all completed request\u0027s complete fn is called (bsc#1149446).\n- objtool: Add rewind_stack_do_exit() to the noreturn list (bsc#1145302).\n- objtool: Support GCC 9 cold subfunction naming scheme (bsc#1145300).\n- octeon_mgmt: Fix MIX registers configuration on MTU setup (bsc#1051510).\n- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).\n- PCI: Add Amazon\u0027s Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).\n- PCI: Add quirk to disable MSI-X support for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver (SLE-9332).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Fix panic by calling hv_pci_remove_slots() earlier (bsc#1142701).\n- PCI: PM/ACPI: Refresh all stale power state data in pci_pm_complete() (bsc#1149106).\n- PCI: qcom: Ensure that PERST is asserted for at least 100 ms (bsc#1142635).\n- PCI: Restore Resizable BAR size bits correctly for 1MB BARs (bsc#1143841).\n- PCI/VPD: Prevent VPD access for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: xilinx-nwl: Fix Multi MSI data programming (bsc#1142635).\n- phy: qcom-qusb2: Fix crash if nvmem cell not specified (bsc#1051510).\n- phy: renesas: rcar-gen2: Fix memory leak at error paths (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- pinctrl: pistachio: fix leaked of_node references (bsc#1051510).\n- pinctrl: rockchip: fix leaked of_node references (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- PM / devfreq: rk3399_dmc: do not print error when get supply and clk defer (bsc#1144718,bsc#1144813).\n- PM / devfreq: rk3399_dmc: fix spelling mistakes (bsc#1144718,bsc#1144813).\n- PM / devfreq: rk3399_dmc: Pass ODT and auto power down parameters to TF-A (bsc#1144718,bsc#1144813).\n- PM / devfreq: rk3399_dmc: remove unneeded semicolon (bsc#1144718,bsc#1144813).\n- PM / devfreq: rk3399_dmc: remove wait for dcf irq event (bsc#1144718,bsc#1144813).\n- PM / devfreq: rockchip-dfi: Move GRF definitions to a common place (bsc#1144718,bsc#1144813).\n- PM / OPP: OF: Use pr_debug() instead of pr_err() while adding OPP table (jsc#SLE-7294).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- PNFS fallback to MDS if no deviceid found (git-fixes).\n- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s: Include cpu header (bsc#1065729).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range flush (bsc#1055117 bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc: Allow flush_(inval_)dcache_range to work across ranges \u003e4GB (bsc#1146575 ltc#180764).\n- powerpc/book3s/64: check for NULL pointer in pgd_alloc() (bsc#1078248, git-fixes).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc: dump kernel log before carrying out fadump or kdump (bsc#1149940 ltc#179958).\n- powerpc/fadump: use kstrtoint to handle sysfs store (bsc#1146376).\n- powerpc/fadump: when fadump is supported register the fadump sysfs files (bsc#1146352).\n- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).\n- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/kdump: Handle crashkernel memory reservation failure (bsc#1143466 LTC#179600).\n- powerpc/lib: Fix feature fixup test of external branch (bsc#1065729).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: Handle page table allocation failures (bsc#1065729).\n- powerpc/mm/hash/4k: Do not use 64K page size for vmemmap with 4K pagesize (bsc#1142685 LTC#179509).\n- powerpc/mm/nvdimm: Add an informative message if we fail to allocate altmap block (bsc#1142685 LTC#179509).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: Use the right page size for vmemmap mapping (bsc#1055117 bsc#1142685 LTC#179509).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/nvdimm: Add support for multibyte read/write for metadata (bsc#1142685 LTC#179509).\n- powerpc/nvdimm: Pick nearby online node if the device node is not online (bsc#1142685 ltc#179509).\n- powerpc/papr_scm: Fix an off-by-one check in papr_scm_meta_{get, set} (bsc#1152243 ltc#181472).\n- powerpc/perf: Add constraints for power9 l2/l3 bus events (bsc#1056686).\n- powerpc/perf: Add mem access events to sysfs (bsc#1124370).\n- powerpc/perf: Cleanup cache_sel bits comment (bsc#1056686).\n- powerpc/perf: Fix thresholding counter data for unknown type (bsc#1056686).\n- powerpc/perf: Remove PM_BR_CMPL_ALT from power9 event list (bsc#1047238, bsc#1056686).\n- powerpc/perf: Update perf_regs structure to include SIER (bsc#1056686).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/powernv/opal-dump : Use IRQ_HANDLED instead of numbers in interrupt handler (bsc#1065729).\n- powerpc/powernv: Return for invalid IMC domain (bsc1054914, git-fixes).\n- powerpc/powernv: Use kernel crash path for machine checks (bsc#1149940 ltc#179958).\n- powerpc/pseries: add missing cpumask.h include file (bsc#1065729).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 ltc#178925).\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries: Fix xive=off command line (bsc#1085030, git-fixes).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries, ps3: panic flush kernel messages before halting system (bsc#1149940 ltc#179958).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries/scm: Mark the region volatile if cache flush not required (bsc#1142685 LTC#179509).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Fix dump of XIVE interrupt under pseries (bsc#1142019).\n- powerpc/xive: Fix loop exit-condition in xive_find_target_in_mask() (bsc#1085030, bsc#1145189, LTC#179762).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xmon: Add a dump of all XIVE interrupts (bsc#1142019).\n- powerpc/xmon: Check for HV mode when dumping XIVE info from OPAL (bsc#1142019).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: fix printk_time race (bsc#1152466).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1051510).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bcs#1082635 bcs#1141340 bcs#1143706).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- qlge: Deduplicate lbq_buf_size (bsc#1106061).\n- qlge: Deduplicate rx buffer queue management (bsc#1106061).\n- qlge: Factor out duplicated expression (bsc#1106061).\n- qlge: Fix dma_sync_single calls (bsc#1106061).\n- qlge: Fix irq masking in INTx mode (bsc#1106061).\n- qlge: Refill empty buffer queues from wq (bsc#1106061).\n- qlge: Refill rx buffers up to multiple of 16 (bsc#1106061).\n- qlge: Remove bq_desc.maplen (bsc#1106061).\n- qlge: Remove irq_cnt (bsc#1106061).\n- qlge: Remove page_chunk.last_flag (bsc#1106061).\n- qlge: Remove qlge_bq.len \u0026 size (bsc#1106061).\n- qlge: Remove rx_ring.sbq_buf_size (bsc#1106061).\n- qlge: Remove rx_ring.type (bsc#1106061).\n- qlge: Remove useless dma synchronization calls (bsc#1106061).\n- qlge: Remove useless memset (bsc#1106061).\n- qlge: Replace memset with assignment (bsc#1106061).\n- qlge: Update buffer queue prod index despite oom (bsc#1106061).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- raid5-cache: Need to do start() part job after adding journal device (git fixes).\n- rbd: do not (ab)use obj_req-\u003epages for stat requests (bsc#1141450).\n- rbd: do not NULL out -\u003eobj_request in rbd_img_obj_parent_read_full() (bsc#1141450).\n- rbd: get rid of img_req-\u003ecopyup_pages (bsc#1141450).\n- rbd: move from raw pages to bvec data descriptors (bsc#1141450).\n- rbd: remove bio cloning helpers (bsc#1141450).\n- rbd: start enums at 1 instead of 0 (bsc#1141450).\n- rbd: use kmem_cache_zalloc() in rbd_img_request_create() (bsc#1141450).\n- RDMA/hns: Add mtr support for mixed multihop addressing (bsc#1104427).\n- RDMA/hns: Bugfix for calculating qp buffer size (bsc#1104427 ).\n- RDMA/hns: Bugfix for filling the sge of srq (bsc#1104427 ).\n- RDMa/hns: Do not stuck in endless timeout loop (bsc#1104427 ).\n- RDMA/hns: Fix an error code in hns_roce_set_user_sq_size() (bsc#1104427).\n- RDMA/hns: fix inverted logic of readl read and shift (bsc#1104427).\n- RDMA/hns: Fixs hw access invalid dma memory error (bsc#1104427 ).\n- RDMA/hns: Fixup qp release bug (bsc#1104427).\n- RDMA/hns: Modify ba page size for cqe (bsc#1104427).\n- RDMA/hns: Remove set but not used variable \u0027fclr_write_fail_flag\u0027 (bsc#1104427).\n- RDMA/hns: Remove unnecessary print message in aeq (bsc#1104427 ).\n- RDMA/hns: Replace magic numbers with #defines (bsc#1104427 ).\n- RDMA/hns: reset function when removing module (bsc#1104427 ).\n- RDMA/hns: Set reset flag when hw resetting (bsc#1104427 ).\n- RDMA/hns: Use %pK format pointer print (bsc#1104427 ).\n- refresh: soc: fsl: guts: Add definition for LX2160A ().\n- regmap: fix bulk writes on paged registers (bsc#1051510).\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- regulator: qcom_spmi: Fix math of spmi_regulator_set_voltage_time_sel (bsc#1051510).\n- Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510, bsc#1144333).\n- Revert \u0027Bluetooth: validate BLE connection interval updates\u0027 (bsc#1051510).\n- Revert \u0027cfg80211: fix processing world regdomain when non modular\u0027 (bsc#1051510).\n- Revert \u0027dm bufio: fix deadlock with loop device\u0027 (git fixes).\n- Revert i915 userptr page lock patch (bsc#1145051) This patch potentially causes a deadlock between kcompactd, as reported on 5.3-rc3. Revert it until a proper fix is found.\n- Revert \u0027mwifiex: fix system hang problem after resume\u0027 (bsc#1051510).\n- Revert \u0027net: ena: ethtool: add extra properties retrieval via get_priv_flags\u0027 (bsc#1139020 bsc#1139021).\n- Revert patches.suse/0001-blk-wbt-Avoid-lock-contention-and-thundering-herd-is.patch (bsc#1141543) As we see stalls / crashes recently with the relevant code path, revert this patch tentatively.\n- Revert \u0027scsi: ncr5380: Increase register polling limit\u0027 (git-fixes).\n- Revert \u0027scsi: prefix header search paths with $(srctree)/ (bsc#1136346\u0027 This reverts commit 5f679430713da59f5367aa9499e544e6187ac17c. Reverting this commit fixes build for me.\n- Revert \u0027scsi: ufs: disable vccq if it\u0027s not needed by UFS device\u0027 (git-fixes).\n- rpmsg: added MODULE_ALIAS for rpmsg_char (bsc#1051510).\n- rpmsg: smd: do not use mananged resources for endpoints and channels (bsc#1051510).\n- rpmsg: smd: fix memory leak on channel create (bsc#1051510).\n- rsi: improve kernel thread handling to fix kernel panic (bsc#1051510).\n- rslib: Fix decoding of shortened codes (bsc#1051510).\n- rslib: Fix handling of of caller provided syndrome (bsc#1051510).\n- rtc: pcf8523: do not return invalid date when battery is low (bsc#1051510).\n- rtc: pcf8563: Clear event flags and disable interrupts before requesting irq (bsc#1051510).\n- rtc: pcf8563: Fix interrupt trigger method (bsc#1051510).\n- rtlwifi: Fix file release memory leak (bsc#1111666).\n- rxrpc: Fix send on a connected, but unbound socket (networking-stable-19_07_25).\n- s390/cio: fix ccw_device_start_timeout API (bsc#1142109 LTC#179339).\n- s390/dasd: fix endless loop after read unit address configuration (bsc#1144912 LTC#179907).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142117 bsc#1142118 bsc#1142119 LTC#179329 LTC#179330 LTC#179331).\n- s390/qeth: avoid control IO completion stalls (bsc#1142109 LTC#179339).\n- s390/qeth: cancel cmd on early error (bsc#1142109 LTC#179339).\n- s390/qeth: fix request-side race during cmd IO timeout (bsc#1142109 LTC#179339).\n- s390/qeth: release cmd buffer in error paths (bsc#1142109 LTC#179339).\n- s390/qeth: simplify reply object handling (bsc#1142109 LTC#179339).\n- samples, bpf: fix to change the buffer size for read() (bsc#1051510).\n- samples: mei: use /dev/mei0 instead of /dev/mei (bsc#1051510).\n- sched/fair: Do not free p-\u003enuma_faults with concurrent readers (bsc#1144920).\n- sched/fair: Use RCU accessors consistently for -\u003enuma_group (bsc#1144920).\n- scripts/checkstack.pl: Fix arm64 wrong or unknown architecture (bsc#1051510).\n- scripts/decode_stacktrace: only strip base path when a prefix of the path (bsc#1051510).\n- scripts/decode_stacktrace.sh: prefix addr2line with $CROSS_COMPILE (bsc#1051510).\n- scripts/gdb: fix lx-version string output (bsc#1051510).\n- scsi: aacraid: Fix missing break in switch statement (git-fixes).\n- scsi: aacraid: Fix performance issue on logical drives (git-fixes).\n- scsi: aic94xx: fix an error code in aic94xx_init() (git-fixes).\n- scsi: aic94xx: fix module loading (git-fixes).\n- scsi: bfa: Avoid implicit enum conversion in bfad_im_post_vendor_event (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: bfa_fcs_lport: Mark expected switch fall-throughs (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: bfa_fcs_rport: Mark expected switch fall-throughs (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: bfa_ioc: Mark expected switch fall-throughs (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: clean up a couple of indentation issues (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: convert to strlcpy/strlcat (git-fixes).\n- scsi: bfa: fix calls to dma_set_mask_and_coherent() (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: no need to check return value of debugfs_create functions (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: remove ScsiResult macro (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: Remove unused functions (bsc#1136496 jsc#SLE-4698).\n- scsi: bfa: use dma_set_mask_and_coherent (bsc#1136496 jsc#SLE-4698).\n- scsi: bnx2fc: Do not allow both a cleanup completion and abort completion for the same request (bsc#1144582).\n- scsi: bnx2fc: fix bnx2fc_cmd refcount imbalance in send_rec (bsc#1144582).\n- scsi: bnx2fc: fix bnx2fc_cmd refcount imbalance in send_srr (bsc#1144582).\n- scsi: bnx2fc: Fix error handling in probe() (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: fix incorrect cast to u64 on shift operation (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: fix incorrect cast to u64 on shift operation (git-fixes).\n- scsi: bnx2fc: Fix NULL dereference in error handling (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: Fix NULL dereference in error handling (git-fixes).\n- scsi: bnx2fc: Limit the IO size according to the FW capability (bsc#1144582).\n- scsi: bnx2fc: Only put reference to io_req in bnx2fc_abts_cleanup if cleanup times out (bsc#1144582).\n- scsi: bnx2fc: Redo setting source FCoE MAC (bsc#1144582).\n- scsi: bnx2fc: Remove set but not used variable \u0027oxid\u0027 (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: remove unneeded variable (bsc#1136502 jsc#SLE-4703).\n- scsi: bnx2fc: Separate out completion flags and variables for abort and cleanup (bsc#1144582).\n- scsi: bnx2fc: Update the driver version to 2.12.10 (bsc#1144582).\n- scsi: core: Fix race on creating sense cache (git-fixes).\n- scsi: core: set result when the command cannot be dispatched (git-fixes).\n- scsi: core: Synchronize request queue PM status only on successful resume (git-fixes).\n- scsi: cxgb4i: fix incorrect spelling \u0027reveive\u0027 -\u003e \u0027receive\u0027 (bsc#1136346 jsc#SLE-4682).\n- scsi: cxgb4i: get pf number from lldi-\u003epf (bsc#1136346 jsc#SLE-4682).\n- scsi: cxgb4i: validate tcp sequence number only if chip version \u0026lt;= T5 (bsc#1136346 jsc#SLE-4682).\n- scsi: cxlflash: Mark expected switch fall-throughs (bsc#1148868).\n- scsi: cxlflash: Prevent deadlock when adapter probe fails (git-fixes).\n- scsi: esp_scsi: Track residual for PIO transfers (git-fixes) Also, mitigate kABI changes.\n- scsi: fas216: fix sense buffer initialization (git-fixes).\n- scsi: hisi_sas: Add support for DIX feature for v3 hw (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: change queue depth from 512 to 4096 (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Change SERDES_CFG init value to increase reliability of HiLink (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Disable stash for v3 hw (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Fix losing directly attached disk when hot-plug (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Ignore the error code between phy down to phy up (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Issue internal abort on all relevant queues (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: kabi fixes (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: print PHY RX errors count for later revision of v3 hw (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Reduce HISI_SAS_SGE_PAGE_CNT in size (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Reject setting programmed minimum linkrate \u003e 1.5G (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: send primitive NOTIFY to SSP situation only (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: shutdown axi bus to avoid exception CQ returned (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: hisi_sas: Use pci_irq_get_affinity() for v3 hw as experimental (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: isci: initialize shost fully before calling scsi_add_host() (git-fixes).\n- scsi: libcxgbi: find cxgbi device by MAC address (bsc#1136352 jsc#SLE-4687).\n- scsi: libcxgbi: remove uninitialized variable len (bsc#1136352 jsc#SLE-4687).\n- scsi: libcxgbi: update route finding logic (bsc#1136352 jsc#SLE-4687)\n- scsi: libfc: fix null pointer dereference on a null lport (git-fixes).\n- scsi: libsas: delete sas port if expander discover failed (git-fixes).\n- scsi: libsas: Fix rphy phy_identifier for PHYs with end devices attached (git-fixes).\n- scsi: libsas: kABI protect struct sas_task_slow (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: libsas: only clear phy-\u003ein_shutdown after shutdown event done (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: lpfc: add check for loss of ndlp when sending RRQ (bsc#1148308).\n- scsi: lpfc: Add first and second level hardware revisions to sysfs (bsc#1146215).\n- scsi: lpfc: Add MDS driver loopback diagnostics support (bsc#1146215).\n- scsi: lpfc: Add NVMe sequence level error recovery support (bsc#1146215).\n- scsi: lpfc: Add simple unlikely optimizations to reduce NVME latency (bsc#1146215).\n- scsi: lpfc: Avoid unused function warnings (bsc#1148308).\n- scsi: lpfc: change snprintf to scnprintf for possible overflow (bsc#1146215).\n- scsi: lpfc: Convert timers to use timer_setup() (bsc#1148308).\n- scsi: lpfc: correct rcu unlock issue in lpfc_nvme_info_show (bsc#1148308).\n- scsi: lpfc: Default fdmi_on to on (bsc#1148308).\n- scsi: lpfc: Fix ADISC reception terminating login state if a NVME (bsc#1146215).\n- scsi: lpfc: Fix BlockGuard enablement on FCoE adapters (bsc#1146215).\n- scsi: lpfc: Fix coverity warnings (bsc#1146215).\n- scsi: lpfc: Fix crash due to port reset racing vs adapter error (bsc#1146215).\n- scsi: lpfc: Fix crash on driver unload in wq free (bsc#1146215).\n- scsi: lpfc: Fix crash when cpu count is 1 and null irq affinity mask (bsc#1146215).\n- scsi: lpfc: Fix deadlock on host_lock during cable pulls (bsc#1146215).\n- scsi: lpfc: Fix devices that do not return after devloss followed by (bsc#1146215).\n- scsi: lpfc: Fix discovery when target has no GID_FT information (bsc#1146215).\n- scsi: lpfc: Fix ELS field alignments (bsc#1146215).\n- scsi: lpfc: Fix error in remote port address change (bsc#1146215).\n- scsi: lpfc: Fix failure to clear non-zero eq_delay after io rate (bsc#1146215).\n- scsi: lpfc: Fix FLOGI handling across multiple link up/down (bsc#1146215).\n- scsi: lpfc: Fix hang when downloading fw on port enabled for nvme (bsc#1146215).\n- scsi: lpfc: Fix irq raising in lpfc_sli_hba_down (bsc#1146215).\n- scsi: lpfc: Fix issuing init_vpi mbox on SLI-3 card (bsc#1146215).\n- scsi: lpfc: Fix leak of ELS completions on adapter reset (bsc#1146215).\n- scsi: lpfc: Fix loss of remote port after devloss due to lack of RPIs (bsc#1146215).\n- scsi: lpfc: Fix Max Frame Size value shown in fdmishow output (bsc#1146215).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs (bsc#1146215).\n- scsi: lpfc: Fix nvme first burst module parameter description (bsc#1146215).\n- scsi: lpfc: Fix nvme sg_seg_cnt display if HBA does not support NVME (bsc#1146215).\n- scsi: lpfc: Fix nvme target mode ABTSing a received ABTS (bsc#1146215).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1146215).\n- scsi: lpfc: Fix oops when fewer hdwqs than cpus (bsc#1146215).\n- scsi: lpfc: Fix PLOGI failure with high remoteport count (bsc#1146215).\n- scsi: lpfc: Fix port relogin failure due to GID_FT interaction (bsc#1146215).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1146215).\n- scsi: lpfc: Fix reported physical link speed on a disabled trunked (bsc#1146215).\n- scsi: lpfc: Fix reset recovery paths that are not recovering (bsc#1144375).\n- scsi: lpfc: Fix sg_seg_cnt for HBAs that do not support NVME (bsc#1146215).\n- scsi: lpfc: Fix sli4 adapter initialization with MSI (bsc#1146215).\n- scsi: lpfc: Fix too many sg segments spamming in kernel log (bsc#1146215).\n- scsi: lpfc: Fix upcall to bsg done in non-success cases (bsc#1146215).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1146215).\n- scsi: lpfc: lpfc_sli: Mark expected switch fall-throughs (bsc#1148308).\n- scsi: lpfc: Make some symbols static (bsc#1148308).\n- scsi: lpfc: Merge per-protocol WQ/CQ pairs into single per-cpu pair (bsc#1146215).\n- scsi: lpfc: Migrate to %px and %pf in kernel print calls (bsc#1146215).\n- scsi: lpfc: no need to check return value of debugfs_create functions (bsc#1148308).\n- scsi: lpfc: nvme: avoid hang / use-after-free when destroying localport (bsc#1148308).\n- scsi: lpfc: nvmet: avoid hang / use-after-free when destroying targetport (bsc#1148308).\n- scsi: lpfc: remove a bogus pci_dma_sync_single_for_device call (bsc#1148308).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove NULL check before some freeing functions (bsc#1146215).\n- scsi: lpfc: remove null check on nvmebuf (bsc#1148308).\n- scsi: lpfc: remove ScsiResult macro (bsc#1148308).\n- scsi: lpfc: Remove set but not used variable \u0027psli\u0027 (bsc#1148308).\n- scsi: lpfc: Remove set but not used variables \u0027fc_hdr\u0027 and \u0027hw_page_size\u0027 (bsc#1148308).\n- scsi: lpfc: Remove set but not used variables \u0027qp\u0027 (bsc#1148308).\n- scsi: lpfc: Remove set but not used variables \u0027tgtp\u0027 (bsc#1148308).\n- scsi: lpfc: Resolve checker warning for lpfc_new_io_buf() (bsc#1144375).\n- scsi: lpfc: resolve lockdep warnings (bsc#1148308).\n- scsi: lpfc: Support dynamic unbounded SGL lists on G7 hardware (bsc#1146215).\n- scsi: lpfc: Update lpfc version to 12.4.0.0 (bsc#1146215).\n- scsi: lpfc: Use dma_zalloc_coherent (bsc#1148308).\n- scsi: lpfc: use sg helper to iterate over scatterlist (bsc#1148308).\n- scsi: mac_scsi: Fix pseudo DMA implementation, take 2 (git-fixes).\n- scsi: mac_scsi: Increase PIO/PDMA transfer length threshold (git-fixes).\n- scsi: megaraid: fix out-of-bound array accesses (git-fixes).\n- scsi: megaraid_sas: Fix calculation of target ID (git-fixes).\n- scsi: megaraid_sas: IRQ poll to avoid CPU hard lockups (bsc#1143962).\n- scsi: megaraid_sas: Release Mutex lock before OCR in case of DCMD timeout (bsc#1143962).\n- scsi: mpt3sas: Determine smp affinity on per HBA basis (bsc#1143738).\n- scsi: mpt3sas: Fix msix load balance on and off settings (bsc#1143738).\n- scsi: mpt3sas: make driver options visible in sys (bsc#1143738).\n- scsi: mpt3sas: Mark expected switch fall-through (bsc#1143738).\n- scsi: mpt3sas: Remove CPU arch check to determine perf_mode (bsc#1143738).\n- scsi: mpt3sas: Use 63-bit DMA addressing on SAS35 HBA (bsc#1143738).\n- scsi: mpt3sas: Use configured PCIe link speed, not max (bsc#1143738).\n- scsi: mpt3sas: use DEVICE_ATTR_{RO, RW} (bsc#1143738).\n- scsi: NCR5380: Always re-enable reselection interrupt (git-fixes).\n- scsi: pmcraid: do not allocate a dma coherent buffer for sense data (bsc#1135990 jsc#SLE-4709).\n- scsi: pmcraid: simplify pmcraid_cancel_all a bit (bsc#1135990 jsc#SLE-4709).\n- scsi: pmcraid: use generic DMA API (bsc#1135990 jsc#SLE-4709).\n- scsi: pmcraid: use sg helper to iterate over scatterlist (bsc#1135990 jsc#SLE-4709).\n- scsi: prefix header search paths with $(srctree)/ (bsc#1136346 jsc#SLE-4682).\n- scsi: qedf: Add debug information for unsolicited processing (bsc#1149976).\n- scsi: qedf: Add shutdown callback handler (bsc#1149976).\n- scsi: qedf: Add support for 20 Gbps speed (bsc#1149976).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1149976).\n- scsi: qedf: Check for link state before processing LL2 packets and send fipvlan retries (bsc#1149976).\n- scsi: qedf: Check for module unloading bit before processing link update AEN (bsc#1149976).\n- scsi: qedf: Decrease the LL2 MTU size to 2500 (bsc#1149976).\n- scsi: qedf: Fix race betwen fipvlan request and response path (bsc#1149976).\n- scsi: qedf: Initiator fails to re-login to switch after link down (bsc#1149976).\n- scsi: qedf: Print message during bailout conditions (bsc#1149976).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (git-fixes).\n- scsi: qedf: remove set but not used variables (bsc#1149976).\n- scsi: qedf: Stop sending fipvlan request on unload (bsc#1149976).\n- scsi: qedf: Update module description string (bsc#1149976).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1149976).\n- scsi: qedf: Update the version to 8.42.3.0 (bsc#1149976).\n- scsi: qedf: Use discovery list to traverse rports (bsc#1149976).\n- scsi: qedi: remove declaration of nvm_image from stack (git-fixes).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add cleanup for PCI EEH recovery (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Add cleanup for PCI EEH recovery (bsc#1129424).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1143706).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qlt_send_resp_ctio() corrupts memory (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Avoid that qlt_send_resp_ctio() corrupts memory (git-fixes).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change a stack variable into a static const variable (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1143706).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1143706).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1143706).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1143706).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1143706).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1134476).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1143706).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1143706).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1143706).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1143706).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1143706).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1143706).\n- scsi: qla2xxx: Declare local symbols static (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1143706).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1143706).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1143706).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven\u0027t been resolved. Also the newer version failed to get a proper review. For time being it\u0027s better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1143706).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a format specifier (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix a format specifier (git-fixes).\n- scsi: qla2xxx: Fix an endian bug in fcpcmd_is_corrupted() (git-fixes).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1143706).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1143706).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix device staying in blocked state (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix device staying in blocked state (git-fixes).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1143706).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix error handling in qlt_alloc_qfull_cmd() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix error handling in qlt_alloc_qfull_cmd() (git-fixes).\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1143706).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1143706).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1143706).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1143706).\n- scsi: qla2xxx: fix spelling mistake \u0027alredy\u0027 -\u003e \u0027already\u0027 (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: fix spelling mistake \u0027alredy\u0027 -\u003e \u0027already\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027initializatin\u0027 -\u003e \u0027initialization\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1143706).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1143706).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1143706).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the \u0026lt;asm/unaligned.h\u003e header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the \u0026lt;asm/unaligned.h\u003e header file from qla_dsd.h (bsc#1143706).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1143706).\n- scsi: qla2xxx: Insert spaces where required (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1143706).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1143706).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1143706).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1143706).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1143706).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1143706).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1143706).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1143706).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the \u0026lt;linux/io-64-nonatomic-lo-hi.h\u003e include directive (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move the \u0026lt;linux/io-64-nonatomic-lo-hi.h\u003e include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-\u003eeft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-\u003eeft (bsc#1134476).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1143706).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1143706).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1143706).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1143706).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1143706).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable \u0027ptr_dma\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1143706).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1143706).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1143706).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1143706).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1143706).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1143706).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1143706).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1143706).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1143706).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1143706).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1143706).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister chrdev if module initialization fails (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Unregister chrdev if module initialization fails (git-fixes).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update two source code comments (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Update two source code comments (git-fixes).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t[2] for sending DMA addresses to firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1143706).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1143706).\n- scsi: qla4xxx: avoid freeing unallocated dma memory (git-fixes).\n- scsi: raid_attrs: fix unused variable warning (git-fixes).\n- scsi: sas: Convert timers to use timer_setup() (bsc#1137322 bsc#1137323 bsc#1138099 bsc#1138100).\n- scsi: scsi_dh_alua: Fix possible null-ptr-deref (git-fixes).\n- scsi: scsi_dh_rdac: zero cdb in send_mode_select() (bsc#1149313).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (git-fixes).\n- scsi: sd: Fix a race between closing an sd device and sd I/O (git-fixes).\n- scsi: sd: Fix cache_type_store() (git-fixes).\n- scsi: sd: Optimal I/O size should be a multiple of physical block size (git-fixes).\n- scsi: sd: Quiesce warning if device does not report optimal I/O size (git-fixes).\n- scsi: sd: use mempool for discard special page (git-fixes).\n- scsi: sd_zbc: Fix potential memory leak (git-fixes).\n- scsi: smartpqi: unlock on error in pqi_submit_raid_request_synchronous() (git-fixes).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (git-fixes).\n- scsi: target: iscsi: cxgbit: add missing spin_lock_init() (bsc#1136349 jsc#SLE-4685).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi_transport_fc: complete requests from -\u003etimeout (bsc#1142076).\n- scsi: ufs: Avoid runtime suspend possibly being blocked forever (git-fixes).\n- scsi: ufs: Check that space was properly alloced in copy_query_response (git-fixes).\n- scsi: ufs: Fix NULL pointer dereference in ufshcd_config_vreg_hpm() (git-fixes).\n- scsi: ufs: Fix RX_TERMINATION_FORCE_ENABLE define value (git-fixes).\n- scsi: ufs: fix wrong command type of UTRD for UFSHCI v2.1 (git-fixes).\n- scsi: use dma_get_cache_alignment() as minimum DMA alignment (git-fixes).\n- scsi: virtio_scsi: do not send sc payload with tmfs (git-fixes).\n- sctp: change to hold sk after auth shkey is created successfully (networking-stable-19_07_02).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sdhci-fujitsu: add support for setting the CMD_DAT_DELAY attribute (bsc#1145256).\n- secure boot lockdown: Fix-up backport of /dev/mem access restriction The upstream-submitted patch set has evolved over time, align our patches (contents and description) to reflect the current status as far as /dev/mem access is concerned.\n- serial: 8250: Fix TX interrupt handling condition (bsc#1051510).\n- set CONFIG_FB_HYPERV=m to avoid conflict with efifb (bsc#1145134)\n- signal/cifs: Fix cifs_put_tcp_session to call send_sig instead of force_sig (bsc#1144333).\n- sis900: fix TX completion (bsc#1051510).\n- sky2: Disable MSI on ASUS P6T (bsc#1142496).\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter \u0027dev_t line\u0027 (bsc#1051510).\n- smb2: fix missing files in root share directory listing (bsc#1112907, bsc#1144333).\n- smb2: fix typo in definition of a few error flags (bsc#1144333).\n- smb2: fix uninitialized variable bug in smb2_ioctl_query_info (bsc#1144333).\n- SMB3.1.1: Add GCM crypto to the encrypt and decrypt functions (bsc#1144333).\n- SMB3.1.1 dialect is no longer experimental (bsc#1051510, bsc#1144333).\n- SMB311: Fix reconnect (bsc#1051510, bsc#1144333).\n- SMB311: Improve checking of negotiate security contexts (bsc#1051510, bsc#1144333).\n- smb3.11: replace a 4 with server-\u003evals-\u003eheader_preamble_size (bsc#1144333).\n- smb3: add additional ftrace entry points for entry/exit to cifs.ko (bsc#1144333).\n- smb3: add credits we receive from oplock/break PDUs (bsc#1144333).\n- smb3: add debug for unexpected mid cancellation (bsc#1144333).\n- smb3: Add debug message later in smb2/smb3 reconnect path (bsc#1144333).\n- smb3: add define for id for posix create context and corresponding struct (bsc#1144333).\n- smb3: Add defines for new negotiate contexts (bsc#1144333).\n- smb3: add dynamic trace point for query_info_enter/done (bsc#1144333).\n- smb3: add dynamic trace point for smb3_cmd_enter (bsc#1144333).\n- smb3: add dynamic tracepoint for timeout waiting for credits (bsc#1144333).\n- smb3: add dynamic tracepoints for simple fallocate and zero range (bsc#1144333).\n- smb3: Add dynamic trace points for various compounded smb3 ops (bsc#1144333).\n- smb3: Add ftrace tracepoints for improved SMB3 debugging (bsc#1144333).\n- smb3: Add handling for different FSCTL access flags (bsc#1144333).\n- smb3: add missing read completion trace point (bsc#1144333).\n- smb3: add module alias for smb3 to cifs.ko (bsc#1144333).\n- smb3: add new mount option to retrieve mode from special ACE (bsc#1144333).\n- smb3: Add posix create context for smb3.11 posix mounts (bsc#1144333).\n- smb3: Add protocol structs for change notify support (bsc#1144333).\n- smb3: add reconnect tracepoints (bsc#1144333).\n- smb3: Add SMB3.1.1 GCM to negotiated crypto algorigthms (bsc#1144333).\n- smb3: add smb3.1.1 to default dialect list (bsc#1144333).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510, bsc#1144333).\n- smb3: add support for posix negotiate context (bsc#1144333).\n- smb3: add support for statfs for smb3.1.1 posix extensions (bsc#1144333).\n- smb3: add tracepoint for sending lease break responses to server (bsc#1144333).\n- smb3: add tracepoint for session expired or deleted (bsc#1144333).\n- smb3: add tracepoint for slow responses (bsc#1144333).\n- smb3: add trace point for tree connection (bsc#1144333).\n- smb3: add tracepoints for query dir (bsc#1144333).\n- smb3: Add tracepoints for read, write and query_dir enter (bsc#1144333).\n- smb3: add tracepoints for smb2/smb3 open (bsc#1144333).\n- smb3: add tracepoint to catch cases where credit refund of failed op overlaps reconnect (bsc#1144333).\n- smb3: add way to control slow response threshold for logging and stats (bsc#1144333).\n- smb3: allow more detailed protocol info on open files for debugging (bsc#1144333).\n- smb3: Allow persistent handle timeout to be configurable on mount (bsc#1144333).\n- smb3: allow posix mount option to enable new SMB311 protocol extensions (bsc#1144333).\n- smb3: allow previous versions to be mounted with snapshot= mount parm (bsc#1144333).\n- smb3: Allow query of symlinks stored as reparse points (bsc#1144333).\n- smb3: Allow SMB3 FSCTL queries to be sent to server from tools (bsc#1144333).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510, bsc#1144333).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510, bsc#1144333).\n- smb3: Backup intent flag missing from compounded ops (bsc#1144333).\n- smb3: check for and properly advertise directory lease support (bsc#1051510, bsc#1144333).\n- smb3 - clean up debug output displaying network interfaces (bsc#1144333).\n- smb3: Cleanup license mess (bsc#1144333).\n- smb3: Clean up query symlink when reparse point (bsc#1144333).\n- smb3: create smb3 equivalent alias for cifs pseudo-xattrs (bsc#1144333).\n- smb3: directory sync should not return an error (bsc#1051510, bsc#1144333).\n- smb3: display bytes_read and bytes_written in smb3 stats (bsc#1144333).\n- smb3: display security information in /proc/fs/cifs/DebugData more accurately (bsc#1144333).\n- smb3: display session id in debug data (bsc#1144333).\n- smb3: display stats counters for number of slow commands (bsc#1144333).\n- smb3: display volume serial number for shares in /proc/fs/cifs/DebugData (bsc#1144333).\n- smb3: do not allow insecure cifs mounts when using smb3 (bsc#1144333).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510, bsc#1144333).\n- smb3: do not display confusing message on mount to Azure servers (bsc#1144333).\n- smb3: do not display empty interface list (bsc#1144333).\n- smb3: Do not ignore O_SYNC/O_DSYNC and O_DIRECT flags (bsc#1085536, bsc#1144333).\n- smb3: do not request leases in symlink creation and query (bsc#1051510, bsc#1144333).\n- smb3: do not send compression info by default (bsc#1144333).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510, bsc#1144333).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510, bsc#1144333).\n- smb3: fill in statfs fsid and correct namelen (bsc#1112905, bsc#1144333).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510, bsc#1144333).\n- smb3: fix bytes_read statistics (bsc#1144333).\n- smb3: fix corrupt path in subdirs on smb311 with posix (bsc#1144333).\n- smb3: Fix deadlock in validate negotiate hits reconnect (bsc#1144333).\n- smb3: Fix endian warning (bsc#1144333, bsc#1137884).\n- smb3: Fix enumerating snapshots to Azure (bsc#1144333).\n- smb3: fix large reads on encrypted connections (bsc#1144333).\n- smb3: fix lease break problem introduced by compounding (bsc#1144333).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510, bsc#1144333).\n- smb3: fix minor debug output for CONFIG_CIFS_STATS (bsc#1144333).\n- smb3: Fix mode on mkdir on smb311 mounts (bsc#1144333).\n- smb3: Fix potential memory leak when processing compound chain (bsc#1144333).\n- smb3: fix redundant opens on root (bsc#1144333).\n- smb3: fix reset of bytes read and written stats (bsc#1112906, bsc#1144333).\n- smb3: Fix rmdir compounding regression to strict servers (bsc#1144333).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510, bsc#1144333).\n- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510, bsc#1144333).\n- smb3: fix various xid leaks (bsc#1051510, bsc#1144333).\n- smb3: for kerberos mounts display the credential uid used (bsc#1144333).\n- smb3: handle new statx fields (bsc#1085536, bsc#1144333).\n- smb3: if max_credits is specified then display it in /proc/mounts (bsc#1144333).\n- smb3: if server does not support posix do not allow posix mount option (bsc#1144333).\n- smb3: improve dynamic tracing of open and posix mkdir (bsc#1144333).\n- smb3: increase initial number of credits requested to allow write (bsc#1144333).\n- smb3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL (bsc#1144333).\n- smb3: Log at least once if tree connect fails during reconnect (bsc#1144333).\n- smb3: make default i/o size for smb3 mounts larger (bsc#1144333).\n- smb3: minor cleanup of compound_send_recv (bsc#1144333).\n- smb3: minor debugging clarifications in rfc1001 len processing (bsc#1144333).\n- smb3: minor missing defines relating to reparse points (bsc#1144333).\n- smb3: missing defines and structs for reparse point handling (bsc#1144333).\n- smb3: note that smb3.11 posix extensions mount option is experimental (bsc#1144333).\n- smb3: Number of requests sent should be displayed for SMB3 not just CIFS (bsc#1144333).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510, bsc#1144333).\n- smb3: on reconnect set PreviousSessionId field (bsc#1112899, bsc#1144333).\n- smb3: optimize open to not send query file internal info (bsc#1144333).\n- smb3: passthru query info does not check for SMB3 FSCTL passthru (bsc#1144333).\n- smb3: print tree id in debugdata in proc to be able to help logging (bsc#1144333).\n- smb3: query inode number on open via create context (bsc#1144333).\n- smb3: remove noisy warning message on mount (bsc#1129664, bsc#1144333).\n- smb3: remove per-session operations from per-tree connection stats (bsc#1144333).\n- smb3: rename encryption_required to smb3_encryption_required (bsc#1144333).\n- smb3: request more credits on normal (non-large read/write) ops (bsc#1144333).\n- smb3: request more credits on tree connect (bsc#1144333).\n- smb3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write (bsc#1144333).\n- smb3: send backup intent on compounded query info (bsc#1144333).\n- smb3: send CAP_DFS capability during session setup (bsc#1144333).\n- smb3: Send netname context during negotiate protocol (bsc#1144333).\n- smb3: show number of current open files in /proc/fs/cifs/Stats (bsc#1144333).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510, bsc#1144333).\n- smb3: smbdirect no longer experimental (bsc#1144333).\n- smb3: snapshot mounts are read-only and make sure info is displayable about the mount (bsc#1144333).\n- smb3: track the instance of each session for debugging (bsc#1144333).\n- smb3: Track total time spent on roundtrips for each SMB3 command (bsc#1144333).\n- smb3: trivial cleanup to smb2ops.c (bsc#1144333).\n- smb3: update comment to clarify enumerating snapshots (bsc#1144333).\n- smb3: update default requested iosize to 4MB from 1MB for recent dialects (bsc#1144333).\n- smb3: Update POSIX negotiate context with POSIX ctxt GUID (bsc#1144333).\n- smb3: Validate negotiate request must always be signed (bsc#1064597, bsc#1144333).\n- smb3: Warn user if trying to sign connection that authenticated as guest (bsc#1085536, bsc#1144333).\n- smbd: Make upper layer decide when to destroy the transport (bsc#1144333).\n- SMB: fix leak of validate negotiate info response buffer (bsc#1064597, bsc#1144333).\n- SMB: fix validate negotiate info uninitialised memory use (bsc#1064597, bsc#1144333).\n- SMB: Validate negotiate (to protect against downgrade) even if signing off (bsc#1085536, bsc#1144333).\n- smpboot: Place the __percpu annotation correctly (git fixes).\n- soc: rockchip: power-domain: Add a sanity check on pd-\u003enum_clks (bsc#1144718,bsc#1144813).\n- soc: rockchip: power-domain: use clk_bulk APIs (bsc#1144718,bsc#1144813).\n- soc: rockchip: power-domain: Use of_clk_get_parent_count() instead of open coding (bsc#1144718,bsc#1144813).\n- sound: fix a memory leak bug (bsc#1051510).\n- spi: bcm2835aux: fix corruptions for longer spi transfers (bsc#1051510).\n- spi: bcm2835aux: remove dangerous uncontrolled read of fifo (bsc#1051510).\n- spi: bcm2835aux: unifying code between polling and interrupt driven code (bsc#1051510).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1111666).\n- st21nfca_connectivity_event_received: null check the allocation (bsc#1051510).\n- staging: comedi: dt3000: Fix rounding up of timer divisor (bsc#1051510).\n- staging: comedi: dt3000: Fix signed integer overflow \u0027divider * base\u0027 (bsc#1051510).\n- staging: fsl-dpaa2/ethsw: fix memory leak of switchdev_work (bsc#1111666).\n- st_nci_hci_connectivity_event_received: null check the allocation (bsc#1051510).\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- supported.conf: Add missing modules (bsc#1066369).\n- supported.conf: Add vfio_ccw (bsc#1151192 jsc#SLE-6138).\n- supported.conf: Mark vfio_ccw supported by SUSE, because bugs can be routed to IBM via SUSE support (jsc#SLE-6138, bsc#1151192).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: Reset bytes_acked and bytes_received when disconnecting (networking-stable-19_07_25).\n- team: Add vlan tx offload to hw_enc_features (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- test_firmware: fix a memory leak bug (bsc#1051510).\n- tipc: change to use register_pernet_device (networking-stable-19_07_02).\n- tools: bpftool: close prog FD before exit on showing a single program (bsc#1109837).\n- tools: bpftool: fix error message (prog -\u003e object) (bsc#1109837).\n- tpm: Fix off-by-one when reading binary_bios_measurements (bsc#1082555).\n- tpm: Fix TPM 1.2 Shutdown sequence to prevent future TPM operations (bsc#1082555).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bsc#1082555).\n- tpm: Unify the send callback behaviour (bsc#1082555).\n- tpm: vtpm_proxy: Suppress error logging when in closed state (bsc#1082555).\n- tracing: Fix header include guards in trace event headers (bsc#1144474).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510, bsc#1144333).\n- treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 231 (bsc#1144333).\n- tty/ldsem, locking/rwsem: Add missing ACQUIRE to read_failed sleep loop (bsc#1051510).\n- tty: max310x: Fix invalid baudrate divisors calculator (bsc#1051510).\n- tty/serial: digicolor: Fix digicolor-usart already registered warning (bsc#1051510).\n- tty: serial: fsl_lpuart: Use appropriate lpuart32_* I/O funcs (bsc#1111666).\n- tty: serial: msm_serial: avoid system lockup condition (bsc#1051510).\n- tua6100: Avoid build warnings (bsc#1051510).\n- tun: fix use-after-free when register netdev failed (bsc#1111666).\n- tun: mark small packets as owned by the tap sock (bsc#1109837).\n- tun: wake up waitqueues after IFF_UP is set (networking-stable-19_07_02).\n- udf: Fix incorrect final NOT_ALLOCATED (hole) extent length (bsc#1148617).\n- Update config files. (bsc#1145687) Add the following kernel config to ARM64: CONFIG_ACPI_PCI_SLOT=y CONFIG_HOTPLUG_PCI_ACPI=y\n- update internal version number for cifs.ko (bsc#1144333).\n- Update patches.arch/powerpc-pseries-Fix-xive-off-command-line.patch (bsc#1085030, bsc#1144518, LTC#178833).\n- Update patches.fixes/0001-docs-Fix-conf.py-for-Sphinx-2.0.patch (bsc#1135642). Fix patch header.\n- Update patches.fixes/MD-fix-invalid-stored-role-for-a-disk-try2.patch (bsc#1143765).\n- Update patches.fixes/tracing-Fix-bad-use-of-igrab-in-trace_uprobe.c.patch (bsc#1120046, bsc#1146141).\n- Update patches.suse/ceph-remove-request-from-waiting-list-before-unregister.patch (bsc#1148133 bsc#1138539).\n- Update patches.suse/ext4-unsupported-features.patch (SLE-8615, bsc#1149651, SLE-9243).\n- Update patches.suse/powerpc-powernv-Return-for-invalid-IMC-domain.patch (bsc#1054914, git-fixes).\n- Update s390 config files (bsc#1151192). - VFIO_CCW=m - S390_CCW_IOMMU=y\n- Update session and share information displayed for debugging SMB2/SMB3 (bsc#1144333).\n- Update version of cifs module (bsc#1144333).\n- usb: cdc-acm: make sure a refcount is taken early enough (bsc#1142635).\n- usb: CDC: fix sanity checks in CDC union parser (bsc#1142635).\n- usb: cdc-wdm: fix race between write and disconnect due to flag abuse (bsc#1051510).\n- usb: chipidea: udc: do not do hardware access if gadget has stopped (bsc#1051510).\n- usb: core: Fix races in character device registration and deregistraion (bsc#1051510).\n- usb: core: hub: Disable hub-initiated U1/U2 (bsc#1051510).\n- usb: gadget: composite: Clear \u0027suspended\u0027 on reset/disconnect (bsc#1051510).\n- usb: gadget: udc: renesas_usb3: Fix sysfs interface of \u0027role\u0027 (bsc#1142635).\n- usb: Handle USB3 remote wakeup for LPM enabled devices correctly (bsc#1051510).\n- usb: host: fotg2: restart hcd after port reset (bsc#1051510).\n- usb: host: ohci: fix a race condition between shutdown and irq (bsc#1051510).\n- usb: host: xhci-rcar: Fix timeout in xhci_suspend() (bsc#1051510).\n- usb: host: xhci: rcar: Fix typo in compatible string matching (bsc#1051510).\n- usb: iowarrior: fix deadlock on disconnect (bsc#1051510).\n- usb: serial: option: add D-Link DWM-222 device ID (bsc#1051510).\n- usb: serial: option: Add Motorola modem UARTs (bsc#1051510).\n- usb: serial: option: Add support for ZTE MF871A (bsc#1051510).\n- usb: serial: option: add the BroadMobi BM818 card (bsc#1051510).\n- usb-storage: Add new JMS567 revision to unusual_devs (bsc#1051510).\n- usb: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).\n- usb: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).\n- usb: typec: tcpm: free log buf memory when remove debug file (bsc#1111666).\n- usb: typec: tcpm: Ignore unsupported/unknown alternate mode requests (bsc#1111666).\n- usb: typec: tcpm: remove tcpm dir if no children (bsc#1111666).\n- usb: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- usb: usbfs: fix double-free of usb memory upon submiturb error (bsc#1051510).\n- usb: wusbcore: fix unbalanced get/put cluster_id (bsc#1051510).\n- usb: yurex: Fix use-after-free in yurex_delete (bsc#1051510).\n- vfs: fix page locking deadlocks when deduping files (bsc#1148619).\n- vhost/test: fix build for vhost test (bsc#1111666).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- virtio/s390: fix race on airq_areas (bsc#1145357).\n- VMCI: Release resource if the work is already queued (bsc#1051510).\n- vrf: make sure skb-\u003edata contains ip header to make routing (networking-stable-19_07_25).\n- watchdog: bcm2835_wdt: Fix module autoload (bsc#1051510).\n- watchdog: core: fix null pointer dereference when releasing cdev (bsc#1051510).\n- watchdog: f71808e_wdt: fix F81866 bit operation (bsc#1051510).\n- watchdog: fix compile time error of pretimeout governors (bsc#1051510).\n- wcn36xx: use dynamic allocation for large variables (bsc#1111666).\n- wimax/i2400m: fix a memory leak bug (bsc#1051510).\n- x86/asm: Remove dead __GNUC__ conditionals (bsc#1112178).\n- x86/boot: Fix memory leak in default_get_smp_config() (bsc#1114279).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/dma: Get rid of iommu_pass_through (bsc#1136039).\n- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/microcode: Fix the microcode load on CPU hotplug for real (bsc#1114279).\n- x86/mm: Check for pfn instead of page in vmalloc_sync_one() (bsc#1118689).\n- x86/mm: Sync also unmappings in vmalloc_sync_all() (bsc#1118689).\n- x86/resctrl: Prevent NULL pointer dereference when local MBM is disabled (bsc#1112178).\n- x86/speculation: Allow guests to use SSBD even if host does not (bsc#1114279).\n- x86/speculation/mds: Apply more accurate check on hypervisor platform (bsc#1114279).\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- x86/unwind: Add hardcoded ORC entry for NULL (bsc#1114279).\n- x86/unwind: Handle NULL pointer calls better in frame unwinder (bsc#1114279).\n- xdp: unpin xdp umem pages in error path (bsc#1109837).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() (bsc#1065600).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: Fix bucket count reported to userspace (bsc#1143300).\n- xfrm: Fix error return code in xfrm_output_one() (bsc#1143300).\n- xfrm: Fix NULL pointer dereference in xfrm_input when skb_dst_force clears the dst_entry (bsc#1143300).\n- xfrm: Fix NULL pointer dereference when skb_dst_force clears the dst_entry (bsc#1143300).\n- xfs: do not crash on null attr fork xfs_bmapi_read (bsc#1148035).\n- xfs: do not trip over uninitialized buffer on extent read of corrupted inode (bsc#1149053).\n- xfs: dump transaction usage details on log reservation overrun (bsc#1145235).\n- xfs: eliminate duplicate icreate tx reservation functions (bsc#1145235).\n- xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT (bsc#1148032).\n- xfs: fix semicolon.cocci warnings (bsc#1145235).\n- xfs: fix up agi unlinked list reservations (bsc#1145235).\n- xfs: include an allocfree res for inobt modifications (bsc#1145235).\n- xfs: include inobt buffers in ifree tx log reservation (bsc#1145235).\n- xfs: print transaction log reservation on overrun (bsc#1145235).\n- xfs: refactor inode chunk alloc/free tx reservation (bsc#1145235).\n- xfs: refactor xlog_cil_insert_items() to facilitate transaction dump (bsc#1145235).\n- xfs: remove more ondisk directory corruption asserts (bsc#1148034).\n- xfs: separate shutdown from ticket reservation print helper (bsc#1145235).\n- xfs: truncate transaction does not modify the inobt (bsc#1145235).\n- xsk: avoid store-tearing when assigning queues (bsc#1111666).\n- xsk: avoid store-tearing when assigning umem (bsc#1111666).\n- {nl,mac}80211: fix interface combinations on crypto controlled devices (bsc#1111666).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2658,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2658",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2658-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2658-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2658-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1047238",
"url": "https://bugzilla.suse.com/1047238"
},
{
"category": "self",
"summary": "SUSE Bug 1050911",
"url": "https://bugzilla.suse.com/1050911"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1054914",
"url": "https://bugzilla.suse.com/1054914"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1056686",
"url": "https://bugzilla.suse.com/1056686"
},
{
"category": "self",
"summary": "SUSE Bug 1060662",
"url": "https://bugzilla.suse.com/1060662"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1061843",
"url": "https://bugzilla.suse.com/1061843"
},
{
"category": "self",
"summary": "SUSE Bug 1064597",
"url": "https://bugzilla.suse.com/1064597"
},
{
"category": "self",
"summary": "SUSE Bug 1064701",
"url": "https://bugzilla.suse.com/1064701"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066369",
"url": "https://bugzilla.suse.com/1066369"
},
{
"category": "self",
"summary": "SUSE Bug 1071009",
"url": "https://bugzilla.suse.com/1071009"
},
{
"category": "self",
"summary": "SUSE Bug 1071306",
"url": "https://bugzilla.suse.com/1071306"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1078248",
"url": "https://bugzilla.suse.com/1078248"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1085536",
"url": "https://bugzilla.suse.com/1085536"
},
{
"category": "self",
"summary": "SUSE Bug 1085539",
"url": "https://bugzilla.suse.com/1085539"
},
{
"category": "self",
"summary": "SUSE Bug 1086103",
"url": "https://bugzilla.suse.com/1086103"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1090734",
"url": "https://bugzilla.suse.com/1090734"
},
{
"category": "self",
"summary": "SUSE Bug 1091171",
"url": "https://bugzilla.suse.com/1091171"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1102097",
"url": "https://bugzilla.suse.com/1102097"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1104902",
"url": "https://bugzilla.suse.com/1104902"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1106061",
"url": "https://bugzilla.suse.com/1106061"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1106434",
"url": "https://bugzilla.suse.com/1106434"
},
{
"category": "self",
"summary": "SUSE Bug 1108382",
"url": "https://bugzilla.suse.com/1108382"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1112894",
"url": "https://bugzilla.suse.com/1112894"
},
{
"category": "self",
"summary": "SUSE Bug 1112899",
"url": "https://bugzilla.suse.com/1112899"
},
{
"category": "self",
"summary": "SUSE Bug 1112902",
"url": "https://bugzilla.suse.com/1112902"
},
{
"category": "self",
"summary": "SUSE Bug 1112903",
"url": "https://bugzilla.suse.com/1112903"
},
{
"category": "self",
"summary": "SUSE Bug 1112905",
"url": "https://bugzilla.suse.com/1112905"
},
{
"category": "self",
"summary": "SUSE Bug 1112906",
"url": "https://bugzilla.suse.com/1112906"
},
{
"category": "self",
"summary": "SUSE Bug 1112907",
"url": "https://bugzilla.suse.com/1112907"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1114542",
"url": "https://bugzilla.suse.com/1114542"
},
{
"category": "self",
"summary": "SUSE Bug 1118689",
"url": "https://bugzilla.suse.com/1118689"
},
{
"category": "self",
"summary": "SUSE Bug 1119086",
"url": "https://bugzilla.suse.com/1119086"
},
{
"category": "self",
"summary": "SUSE Bug 1119113",
"url": "https://bugzilla.suse.com/1119113"
},
{
"category": "self",
"summary": "SUSE Bug 1120046",
"url": "https://bugzilla.suse.com/1120046"
},
{
"category": "self",
"summary": "SUSE Bug 1120876",
"url": "https://bugzilla.suse.com/1120876"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123105",
"url": "https://bugzilla.suse.com/1123105"
},
{
"category": "self",
"summary": "SUSE Bug 1123959",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "self",
"summary": "SUSE Bug 1124370",
"url": "https://bugzilla.suse.com/1124370"
},
{
"category": "self",
"summary": "SUSE Bug 1127988",
"url": "https://bugzilla.suse.com/1127988"
},
{
"category": "self",
"summary": "SUSE Bug 1129424",
"url": "https://bugzilla.suse.com/1129424"
},
{
"category": "self",
"summary": "SUSE Bug 1129519",
"url": "https://bugzilla.suse.com/1129519"
},
{
"category": "self",
"summary": "SUSE Bug 1129664",
"url": "https://bugzilla.suse.com/1129664"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1131281",
"url": "https://bugzilla.suse.com/1131281"
},
{
"category": "self",
"summary": "SUSE Bug 1131304",
"url": "https://bugzilla.suse.com/1131304"
},
{
"category": "self",
"summary": "SUSE Bug 1131489",
"url": "https://bugzilla.suse.com/1131489"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1132686",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1134291",
"url": "https://bugzilla.suse.com/1134291"
},
{
"category": "self",
"summary": "SUSE Bug 1134476",
"url": "https://bugzilla.suse.com/1134476"
},
{
"category": "self",
"summary": "SUSE Bug 1134881",
"url": "https://bugzilla.suse.com/1134881"
},
{
"category": "self",
"summary": "SUSE Bug 1134882",
"url": "https://bugzilla.suse.com/1134882"
},
{
"category": "self",
"summary": "SUSE Bug 1135219",
"url": "https://bugzilla.suse.com/1135219"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135897",
"url": "https://bugzilla.suse.com/1135897"
},
{
"category": "self",
"summary": "SUSE Bug 1135990",
"url": "https://bugzilla.suse.com/1135990"
},
{
"category": "self",
"summary": "SUSE Bug 1136039",
"url": "https://bugzilla.suse.com/1136039"
},
{
"category": "self",
"summary": "SUSE Bug 1136261",
"url": "https://bugzilla.suse.com/1136261"
},
{
"category": "self",
"summary": "SUSE Bug 1136346",
"url": "https://bugzilla.suse.com/1136346"
},
{
"category": "self",
"summary": "SUSE Bug 1136349",
"url": "https://bugzilla.suse.com/1136349"
},
{
"category": "self",
"summary": "SUSE Bug 1136352",
"url": "https://bugzilla.suse.com/1136352"
},
{
"category": "self",
"summary": "SUSE Bug 1136496",
"url": "https://bugzilla.suse.com/1136496"
},
{
"category": "self",
"summary": "SUSE Bug 1136498",
"url": "https://bugzilla.suse.com/1136498"
},
{
"category": "self",
"summary": "SUSE Bug 1136502",
"url": "https://bugzilla.suse.com/1136502"
},
{
"category": "self",
"summary": "SUSE Bug 1136682",
"url": "https://bugzilla.suse.com/1136682"
},
{
"category": "self",
"summary": "SUSE Bug 1137069",
"url": "https://bugzilla.suse.com/1137069"
},
{
"category": "self",
"summary": "SUSE Bug 1137322",
"url": "https://bugzilla.suse.com/1137322"
},
{
"category": "self",
"summary": "SUSE Bug 1137323",
"url": "https://bugzilla.suse.com/1137323"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1137884",
"url": "https://bugzilla.suse.com/1137884"
},
{
"category": "self",
"summary": "SUSE Bug 1137959",
"url": "https://bugzilla.suse.com/1137959"
},
{
"category": "self",
"summary": "SUSE Bug 1137982",
"url": "https://bugzilla.suse.com/1137982"
},
{
"category": "self",
"summary": "SUSE Bug 1138099",
"url": "https://bugzilla.suse.com/1138099"
},
{
"category": "self",
"summary": "SUSE Bug 1138100",
"url": "https://bugzilla.suse.com/1138100"
},
{
"category": "self",
"summary": "SUSE Bug 1138539",
"url": "https://bugzilla.suse.com/1138539"
},
{
"category": "self",
"summary": "SUSE Bug 1139020",
"url": "https://bugzilla.suse.com/1139020"
},
{
"category": "self",
"summary": "SUSE Bug 1139021",
"url": "https://bugzilla.suse.com/1139021"
},
{
"category": "self",
"summary": "SUSE Bug 1139101",
"url": "https://bugzilla.suse.com/1139101"
},
{
"category": "self",
"summary": "SUSE Bug 1139500",
"url": "https://bugzilla.suse.com/1139500"
},
{
"category": "self",
"summary": "SUSE Bug 1140012",
"url": "https://bugzilla.suse.com/1140012"
},
{
"category": "self",
"summary": "SUSE Bug 1140155",
"url": "https://bugzilla.suse.com/1140155"
},
{
"category": "self",
"summary": "SUSE Bug 1140426",
"url": "https://bugzilla.suse.com/1140426"
},
{
"category": "self",
"summary": "SUSE Bug 1140487",
"url": "https://bugzilla.suse.com/1140487"
},
{
"category": "self",
"summary": "SUSE Bug 1141013",
"url": "https://bugzilla.suse.com/1141013"
},
{
"category": "self",
"summary": "SUSE Bug 1141340",
"url": "https://bugzilla.suse.com/1141340"
},
{
"category": "self",
"summary": "SUSE Bug 1141450",
"url": "https://bugzilla.suse.com/1141450"
},
{
"category": "self",
"summary": "SUSE Bug 1141543",
"url": "https://bugzilla.suse.com/1141543"
},
{
"category": "self",
"summary": "SUSE Bug 1141554",
"url": "https://bugzilla.suse.com/1141554"
},
{
"category": "self",
"summary": "SUSE Bug 1142019",
"url": "https://bugzilla.suse.com/1142019"
},
{
"category": "self",
"summary": "SUSE Bug 1142076",
"url": "https://bugzilla.suse.com/1142076"
},
{
"category": "self",
"summary": "SUSE Bug 1142109",
"url": "https://bugzilla.suse.com/1142109"
},
{
"category": "self",
"summary": "SUSE Bug 1142117",
"url": "https://bugzilla.suse.com/1142117"
},
{
"category": "self",
"summary": "SUSE Bug 1142118",
"url": "https://bugzilla.suse.com/1142118"
},
{
"category": "self",
"summary": "SUSE Bug 1142119",
"url": "https://bugzilla.suse.com/1142119"
},
{
"category": "self",
"summary": "SUSE Bug 1142496",
"url": "https://bugzilla.suse.com/1142496"
},
{
"category": "self",
"summary": "SUSE Bug 1142541",
"url": "https://bugzilla.suse.com/1142541"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142685",
"url": "https://bugzilla.suse.com/1142685"
},
{
"category": "self",
"summary": "SUSE Bug 1142701",
"url": "https://bugzilla.suse.com/1142701"
},
{
"category": "self",
"summary": "SUSE Bug 1142857",
"url": "https://bugzilla.suse.com/1142857"
},
{
"category": "self",
"summary": "SUSE Bug 1143300",
"url": "https://bugzilla.suse.com/1143300"
},
{
"category": "self",
"summary": "SUSE Bug 1143331",
"url": "https://bugzilla.suse.com/1143331"
},
{
"category": "self",
"summary": "SUSE Bug 1143466",
"url": "https://bugzilla.suse.com/1143466"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1143738",
"url": "https://bugzilla.suse.com/1143738"
},
{
"category": "self",
"summary": "SUSE Bug 1143765",
"url": "https://bugzilla.suse.com/1143765"
},
{
"category": "self",
"summary": "SUSE Bug 1143841",
"url": "https://bugzilla.suse.com/1143841"
},
{
"category": "self",
"summary": "SUSE Bug 1143843",
"url": "https://bugzilla.suse.com/1143843"
},
{
"category": "self",
"summary": "SUSE Bug 1143962",
"url": "https://bugzilla.suse.com/1143962"
},
{
"category": "self",
"summary": "SUSE Bug 1144123",
"url": "https://bugzilla.suse.com/1144123"
},
{
"category": "self",
"summary": "SUSE Bug 1144333",
"url": "https://bugzilla.suse.com/1144333"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144474",
"url": "https://bugzilla.suse.com/1144474"
},
{
"category": "self",
"summary": "SUSE Bug 1144518",
"url": "https://bugzilla.suse.com/1144518"
},
{
"category": "self",
"summary": "SUSE Bug 1144582",
"url": "https://bugzilla.suse.com/1144582"
},
{
"category": "self",
"summary": "SUSE Bug 1144718",
"url": "https://bugzilla.suse.com/1144718"
},
{
"category": "self",
"summary": "SUSE Bug 1144813",
"url": "https://bugzilla.suse.com/1144813"
},
{
"category": "self",
"summary": "SUSE Bug 1144880",
"url": "https://bugzilla.suse.com/1144880"
},
{
"category": "self",
"summary": "SUSE Bug 1144886",
"url": "https://bugzilla.suse.com/1144886"
},
{
"category": "self",
"summary": "SUSE Bug 1144912",
"url": "https://bugzilla.suse.com/1144912"
},
{
"category": "self",
"summary": "SUSE Bug 1144920",
"url": "https://bugzilla.suse.com/1144920"
},
{
"category": "self",
"summary": "SUSE Bug 1144979",
"url": "https://bugzilla.suse.com/1144979"
},
{
"category": "self",
"summary": "SUSE Bug 1145010",
"url": "https://bugzilla.suse.com/1145010"
},
{
"category": "self",
"summary": "SUSE Bug 1145018",
"url": "https://bugzilla.suse.com/1145018"
},
{
"category": "self",
"summary": "SUSE Bug 1145051",
"url": "https://bugzilla.suse.com/1145051"
},
{
"category": "self",
"summary": "SUSE Bug 1145059",
"url": "https://bugzilla.suse.com/1145059"
},
{
"category": "self",
"summary": "SUSE Bug 1145134",
"url": "https://bugzilla.suse.com/1145134"
},
{
"category": "self",
"summary": "SUSE Bug 1145189",
"url": "https://bugzilla.suse.com/1145189"
},
{
"category": "self",
"summary": "SUSE Bug 1145235",
"url": "https://bugzilla.suse.com/1145235"
},
{
"category": "self",
"summary": "SUSE Bug 1145256",
"url": "https://bugzilla.suse.com/1145256"
},
{
"category": "self",
"summary": "SUSE Bug 1145300",
"url": "https://bugzilla.suse.com/1145300"
},
{
"category": "self",
"summary": "SUSE Bug 1145302",
"url": "https://bugzilla.suse.com/1145302"
},
{
"category": "self",
"summary": "SUSE Bug 1145357",
"url": "https://bugzilla.suse.com/1145357"
},
{
"category": "self",
"summary": "SUSE Bug 1145388",
"url": "https://bugzilla.suse.com/1145388"
},
{
"category": "self",
"summary": "SUSE Bug 1145389",
"url": "https://bugzilla.suse.com/1145389"
},
{
"category": "self",
"summary": "SUSE Bug 1145390",
"url": "https://bugzilla.suse.com/1145390"
},
{
"category": "self",
"summary": "SUSE Bug 1145391",
"url": "https://bugzilla.suse.com/1145391"
},
{
"category": "self",
"summary": "SUSE Bug 1145392",
"url": "https://bugzilla.suse.com/1145392"
},
{
"category": "self",
"summary": "SUSE Bug 1145393",
"url": "https://bugzilla.suse.com/1145393"
},
{
"category": "self",
"summary": "SUSE Bug 1145394",
"url": "https://bugzilla.suse.com/1145394"
},
{
"category": "self",
"summary": "SUSE Bug 1145395",
"url": "https://bugzilla.suse.com/1145395"
},
{
"category": "self",
"summary": "SUSE Bug 1145396",
"url": "https://bugzilla.suse.com/1145396"
},
{
"category": "self",
"summary": "SUSE Bug 1145397",
"url": "https://bugzilla.suse.com/1145397"
},
{
"category": "self",
"summary": "SUSE Bug 1145408",
"url": "https://bugzilla.suse.com/1145408"
},
{
"category": "self",
"summary": "SUSE Bug 1145409",
"url": "https://bugzilla.suse.com/1145409"
},
{
"category": "self",
"summary": "SUSE Bug 1145446",
"url": "https://bugzilla.suse.com/1145446"
},
{
"category": "self",
"summary": "SUSE Bug 1145661",
"url": "https://bugzilla.suse.com/1145661"
},
{
"category": "self",
"summary": "SUSE Bug 1145678",
"url": "https://bugzilla.suse.com/1145678"
},
{
"category": "self",
"summary": "SUSE Bug 1145687",
"url": "https://bugzilla.suse.com/1145687"
},
{
"category": "self",
"summary": "SUSE Bug 1145920",
"url": "https://bugzilla.suse.com/1145920"
},
{
"category": "self",
"summary": "SUSE Bug 1145922",
"url": "https://bugzilla.suse.com/1145922"
},
{
"category": "self",
"summary": "SUSE Bug 1145934",
"url": "https://bugzilla.suse.com/1145934"
},
{
"category": "self",
"summary": "SUSE Bug 1145937",
"url": "https://bugzilla.suse.com/1145937"
},
{
"category": "self",
"summary": "SUSE Bug 1145940",
"url": "https://bugzilla.suse.com/1145940"
},
{
"category": "self",
"summary": "SUSE Bug 1145941",
"url": "https://bugzilla.suse.com/1145941"
},
{
"category": "self",
"summary": "SUSE Bug 1145942",
"url": "https://bugzilla.suse.com/1145942"
},
{
"category": "self",
"summary": "SUSE Bug 1145946",
"url": "https://bugzilla.suse.com/1145946"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146074",
"url": "https://bugzilla.suse.com/1146074"
},
{
"category": "self",
"summary": "SUSE Bug 1146084",
"url": "https://bugzilla.suse.com/1146084"
},
{
"category": "self",
"summary": "SUSE Bug 1146141",
"url": "https://bugzilla.suse.com/1146141"
},
{
"category": "self",
"summary": "SUSE Bug 1146163",
"url": "https://bugzilla.suse.com/1146163"
},
{
"category": "self",
"summary": "SUSE Bug 1146215",
"url": "https://bugzilla.suse.com/1146215"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146346",
"url": "https://bugzilla.suse.com/1146346"
},
{
"category": "self",
"summary": "SUSE Bug 1146351",
"url": "https://bugzilla.suse.com/1146351"
},
{
"category": "self",
"summary": "SUSE Bug 1146352",
"url": "https://bugzilla.suse.com/1146352"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146368",
"url": "https://bugzilla.suse.com/1146368"
},
{
"category": "self",
"summary": "SUSE Bug 1146376",
"url": "https://bugzilla.suse.com/1146376"
},
{
"category": "self",
"summary": "SUSE Bug 1146378",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "self",
"summary": "SUSE Bug 1146381",
"url": "https://bugzilla.suse.com/1146381"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146399",
"url": "https://bugzilla.suse.com/1146399"
},
{
"category": "self",
"summary": "SUSE Bug 1146413",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "self",
"summary": "SUSE Bug 1146425",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "self",
"summary": "SUSE Bug 1146512",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "self",
"summary": "SUSE Bug 1146514",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "self",
"summary": "SUSE Bug 1146516",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146524",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "self",
"summary": "SUSE Bug 1146526",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "self",
"summary": "SUSE Bug 1146529",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "self",
"summary": "SUSE Bug 1146531",
"url": "https://bugzilla.suse.com/1146531"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146543",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "self",
"summary": "SUSE Bug 1146547",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "self",
"summary": "SUSE Bug 1146550",
"url": "https://bugzilla.suse.com/1146550"
},
{
"category": "self",
"summary": "SUSE Bug 1146575",
"url": "https://bugzilla.suse.com/1146575"
},
{
"category": "self",
"summary": "SUSE Bug 1146589",
"url": "https://bugzilla.suse.com/1146589"
},
{
"category": "self",
"summary": "SUSE Bug 1146664",
"url": "https://bugzilla.suse.com/1146664"
},
{
"category": "self",
"summary": "SUSE Bug 1146678",
"url": "https://bugzilla.suse.com/1146678"
},
{
"category": "self",
"summary": "SUSE Bug 1146938",
"url": "https://bugzilla.suse.com/1146938"
},
{
"category": "self",
"summary": "SUSE Bug 1148031",
"url": "https://bugzilla.suse.com/1148031"
},
{
"category": "self",
"summary": "SUSE Bug 1148032",
"url": "https://bugzilla.suse.com/1148032"
},
{
"category": "self",
"summary": "SUSE Bug 1148033",
"url": "https://bugzilla.suse.com/1148033"
},
{
"category": "self",
"summary": "SUSE Bug 1148034",
"url": "https://bugzilla.suse.com/1148034"
},
{
"category": "self",
"summary": "SUSE Bug 1148035",
"url": "https://bugzilla.suse.com/1148035"
},
{
"category": "self",
"summary": "SUSE Bug 1148093",
"url": "https://bugzilla.suse.com/1148093"
},
{
"category": "self",
"summary": "SUSE Bug 1148133",
"url": "https://bugzilla.suse.com/1148133"
},
{
"category": "self",
"summary": "SUSE Bug 1148192",
"url": "https://bugzilla.suse.com/1148192"
},
{
"category": "self",
"summary": "SUSE Bug 1148196",
"url": "https://bugzilla.suse.com/1148196"
},
{
"category": "self",
"summary": "SUSE Bug 1148198",
"url": "https://bugzilla.suse.com/1148198"
},
{
"category": "self",
"summary": "SUSE Bug 1148202",
"url": "https://bugzilla.suse.com/1148202"
},
{
"category": "self",
"summary": "SUSE Bug 1148219",
"url": "https://bugzilla.suse.com/1148219"
},
{
"category": "self",
"summary": "SUSE Bug 1148297",
"url": "https://bugzilla.suse.com/1148297"
},
{
"category": "self",
"summary": "SUSE Bug 1148303",
"url": "https://bugzilla.suse.com/1148303"
},
{
"category": "self",
"summary": "SUSE Bug 1148308",
"url": "https://bugzilla.suse.com/1148308"
},
{
"category": "self",
"summary": "SUSE Bug 1148363",
"url": "https://bugzilla.suse.com/1148363"
},
{
"category": "self",
"summary": "SUSE Bug 1148379",
"url": "https://bugzilla.suse.com/1148379"
},
{
"category": "self",
"summary": "SUSE Bug 1148394",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "self",
"summary": "SUSE Bug 1148527",
"url": "https://bugzilla.suse.com/1148527"
},
{
"category": "self",
"summary": "SUSE Bug 1148570",
"url": "https://bugzilla.suse.com/1148570"
},
{
"category": "self",
"summary": "SUSE Bug 1148574",
"url": "https://bugzilla.suse.com/1148574"
},
{
"category": "self",
"summary": "SUSE Bug 1148616",
"url": "https://bugzilla.suse.com/1148616"
},
{
"category": "self",
"summary": "SUSE Bug 1148617",
"url": "https://bugzilla.suse.com/1148617"
},
{
"category": "self",
"summary": "SUSE Bug 1148619",
"url": "https://bugzilla.suse.com/1148619"
},
{
"category": "self",
"summary": "SUSE Bug 1148698",
"url": "https://bugzilla.suse.com/1148698"
},
{
"category": "self",
"summary": "SUSE Bug 1148712",
"url": "https://bugzilla.suse.com/1148712"
},
{
"category": "self",
"summary": "SUSE Bug 1148859",
"url": "https://bugzilla.suse.com/1148859"
},
{
"category": "self",
"summary": "SUSE Bug 1148868",
"url": "https://bugzilla.suse.com/1148868"
},
{
"category": "self",
"summary": "SUSE Bug 1149053",
"url": "https://bugzilla.suse.com/1149053"
},
{
"category": "self",
"summary": "SUSE Bug 1149083",
"url": "https://bugzilla.suse.com/1149083"
},
{
"category": "self",
"summary": "SUSE Bug 1149104",
"url": "https://bugzilla.suse.com/1149104"
},
{
"category": "self",
"summary": "SUSE Bug 1149105",
"url": "https://bugzilla.suse.com/1149105"
},
{
"category": "self",
"summary": "SUSE Bug 1149106",
"url": "https://bugzilla.suse.com/1149106"
},
{
"category": "self",
"summary": "SUSE Bug 1149197",
"url": "https://bugzilla.suse.com/1149197"
},
{
"category": "self",
"summary": "SUSE Bug 1149214",
"url": "https://bugzilla.suse.com/1149214"
},
{
"category": "self",
"summary": "SUSE Bug 1149224",
"url": "https://bugzilla.suse.com/1149224"
},
{
"category": "self",
"summary": "SUSE Bug 1149313",
"url": "https://bugzilla.suse.com/1149313"
},
{
"category": "self",
"summary": "SUSE Bug 1149325",
"url": "https://bugzilla.suse.com/1149325"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149413",
"url": "https://bugzilla.suse.com/1149413"
},
{
"category": "self",
"summary": "SUSE Bug 1149418",
"url": "https://bugzilla.suse.com/1149418"
},
{
"category": "self",
"summary": "SUSE Bug 1149424",
"url": "https://bugzilla.suse.com/1149424"
},
{
"category": "self",
"summary": "SUSE Bug 1149446",
"url": "https://bugzilla.suse.com/1149446"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1149527",
"url": "https://bugzilla.suse.com/1149527"
},
{
"category": "self",
"summary": "SUSE Bug 1149539",
"url": "https://bugzilla.suse.com/1149539"
},
{
"category": "self",
"summary": "SUSE Bug 1149552",
"url": "https://bugzilla.suse.com/1149552"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1149591",
"url": "https://bugzilla.suse.com/1149591"
},
{
"category": "self",
"summary": "SUSE Bug 1149602",
"url": "https://bugzilla.suse.com/1149602"
},
{
"category": "self",
"summary": "SUSE Bug 1149612",
"url": "https://bugzilla.suse.com/1149612"
},
{
"category": "self",
"summary": "SUSE Bug 1149626",
"url": "https://bugzilla.suse.com/1149626"
},
{
"category": "self",
"summary": "SUSE Bug 1149651",
"url": "https://bugzilla.suse.com/1149651"
},
{
"category": "self",
"summary": "SUSE Bug 1149652",
"url": "https://bugzilla.suse.com/1149652"
},
{
"category": "self",
"summary": "SUSE Bug 1149713",
"url": "https://bugzilla.suse.com/1149713"
},
{
"category": "self",
"summary": "SUSE Bug 1149940",
"url": "https://bugzilla.suse.com/1149940"
},
{
"category": "self",
"summary": "SUSE Bug 1149976",
"url": "https://bugzilla.suse.com/1149976"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150033",
"url": "https://bugzilla.suse.com/1150033"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150305",
"url": "https://bugzilla.suse.com/1150305"
},
{
"category": "self",
"summary": "SUSE Bug 1150381",
"url": "https://bugzilla.suse.com/1150381"
},
{
"category": "self",
"summary": "SUSE Bug 1150423",
"url": "https://bugzilla.suse.com/1150423"
},
{
"category": "self",
"summary": "SUSE Bug 1150562",
"url": "https://bugzilla.suse.com/1150562"
},
{
"category": "self",
"summary": "SUSE Bug 1150727",
"url": "https://bugzilla.suse.com/1150727"
},
{
"category": "self",
"summary": "SUSE Bug 1150846",
"url": "https://bugzilla.suse.com/1150846"
},
{
"category": "self",
"summary": "SUSE Bug 1150860",
"url": "https://bugzilla.suse.com/1150860"
},
{
"category": "self",
"summary": "SUSE Bug 1150861",
"url": "https://bugzilla.suse.com/1150861"
},
{
"category": "self",
"summary": "SUSE Bug 1150933",
"url": "https://bugzilla.suse.com/1150933"
},
{
"category": "self",
"summary": "SUSE Bug 1151067",
"url": "https://bugzilla.suse.com/1151067"
},
{
"category": "self",
"summary": "SUSE Bug 1151192",
"url": "https://bugzilla.suse.com/1151192"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1151610",
"url": "https://bugzilla.suse.com/1151610"
},
{
"category": "self",
"summary": "SUSE Bug 1151661",
"url": "https://bugzilla.suse.com/1151661"
},
{
"category": "self",
"summary": "SUSE Bug 1151662",
"url": "https://bugzilla.suse.com/1151662"
},
{
"category": "self",
"summary": "SUSE Bug 1151667",
"url": "https://bugzilla.suse.com/1151667"
},
{
"category": "self",
"summary": "SUSE Bug 1151680",
"url": "https://bugzilla.suse.com/1151680"
},
{
"category": "self",
"summary": "SUSE Bug 1151891",
"url": "https://bugzilla.suse.com/1151891"
},
{
"category": "self",
"summary": "SUSE Bug 1151955",
"url": "https://bugzilla.suse.com/1151955"
},
{
"category": "self",
"summary": "SUSE Bug 1152024",
"url": "https://bugzilla.suse.com/1152024"
},
{
"category": "self",
"summary": "SUSE Bug 1152025",
"url": "https://bugzilla.suse.com/1152025"
},
{
"category": "self",
"summary": "SUSE Bug 1152026",
"url": "https://bugzilla.suse.com/1152026"
},
{
"category": "self",
"summary": "SUSE Bug 1152161",
"url": "https://bugzilla.suse.com/1152161"
},
{
"category": "self",
"summary": "SUSE Bug 1152187",
"url": "https://bugzilla.suse.com/1152187"
},
{
"category": "self",
"summary": "SUSE Bug 1152243",
"url": "https://bugzilla.suse.com/1152243"
},
{
"category": "self",
"summary": "SUSE Bug 1152325",
"url": "https://bugzilla.suse.com/1152325"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152460",
"url": "https://bugzilla.suse.com/1152460"
},
{
"category": "self",
"summary": "SUSE Bug 1152466",
"url": "https://bugzilla.suse.com/1152466"
},
{
"category": "self",
"summary": "SUSE Bug 1152525",
"url": "https://bugzilla.suse.com/1152525"
},
{
"category": "self",
"summary": "SUSE Bug 1152972",
"url": "https://bugzilla.suse.com/1152972"
},
{
"category": "self",
"summary": "SUSE Bug 1152974",
"url": "https://bugzilla.suse.com/1152974"
},
{
"category": "self",
"summary": "SUSE Bug 1152975",
"url": "https://bugzilla.suse.com/1152975"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18551 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-21008 page",
"url": "https://www.suse.com/security/cve/CVE-2018-21008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15090 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15117 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15211 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15214 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15215 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15292 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15538 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15917 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15919 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15920 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15921 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15924 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-10-14T15:15:10Z",
"generator": {
"date": "2019-10-14T15:15:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2658-1",
"initial_release_date": "2019-10-14T15:15:10Z",
"revision_history": [
{
"date": "2019-10-14T15:15:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-8.16.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-8.16.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-8.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-8.16.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-8.16.1.noarch",
"product_id": "kernel-source-azure-4.12.14-8.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-livepatch-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-4.12.14-8.16.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-8.16.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-8.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-4.12.14-8.16.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-4.12.14-8.16.1.x86_64",
"product_id": "reiserfs-kmp-azure-4.12.14-8.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-8.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-8.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-8.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-8.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-8.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-8.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-8.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-8.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-8.16.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-8.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-8.16.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-8.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18551"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18551",
"url": "https://www.suse.com/security/cve/CVE-2017-18551"
},
{
"category": "external",
"summary": "SUSE Bug 1146163 for CVE-2017-18551",
"url": "https://bugzilla.suse.com/1146163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2017-18551"
},
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2018-21008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-21008"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-21008",
"url": "https://www.suse.com/security/cve/CVE-2018-21008"
},
{
"category": "external",
"summary": "SUSE Bug 1149591 for CVE-2018-21008",
"url": "https://bugzilla.suse.com/1149591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-21008"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14815"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14815",
"url": "https://www.suse.com/security/cve/CVE-2019-14815"
},
{
"category": "external",
"summary": "SUSE Bug 1146514 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-14815"
},
{
"cve": "CVE-2019-14816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14816"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14816",
"url": "https://www.suse.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "SUSE Bug 1146516 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "external",
"summary": "SUSE Bug 1173666 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1173666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-14816"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15090"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15090",
"url": "https://www.suse.com/security/cve/CVE-2019-15090"
},
{
"category": "external",
"summary": "SUSE Bug 1146399 for CVE-2019-15090",
"url": "https://bugzilla.suse.com/1146399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15090"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15117"
}
],
"notes": [
{
"category": "general",
"text": "parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15117",
"url": "https://www.suse.com/security/cve/CVE-2019-15117"
},
{
"category": "external",
"summary": "SUSE Bug 1145920 for CVE-2019-15117",
"url": "https://bugzilla.suse.com/1145920"
},
{
"category": "external",
"summary": "SUSE Bug 1173934 for CVE-2019-15117",
"url": "https://bugzilla.suse.com/1173934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15117"
},
{
"cve": "CVE-2019-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15118"
}
],
"notes": [
{
"category": "general",
"text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15118",
"url": "https://www.suse.com/security/cve/CVE-2019-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1145922 for CVE-2019-15118",
"url": "https://bugzilla.suse.com/1145922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15118"
},
{
"cve": "CVE-2019-15211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15211"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15211",
"url": "https://www.suse.com/security/cve/CVE-2019-15211"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15211"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15214"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15214",
"url": "https://www.suse.com/security/cve/CVE-2019-15214"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146550 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146550"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "low"
}
],
"title": "CVE-2019-15214"
},
{
"cve": "CVE-2019-15215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15215"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15215",
"url": "https://www.suse.com/security/cve/CVE-2019-15215"
},
{
"category": "external",
"summary": "SUSE Bug 1146425 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15215"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15218"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15218",
"url": "https://www.suse.com/security/cve/CVE-2019-15218"
},
{
"category": "external",
"summary": "SUSE Bug 1146413 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15218"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15220",
"url": "https://www.suse.com/security/cve/CVE-2019-15220"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146526 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15220"
},
{
"cve": "CVE-2019-15221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15221"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15221",
"url": "https://www.suse.com/security/cve/CVE-2019-15221"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146529 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15221"
},
{
"cve": "CVE-2019-15222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15222"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15222",
"url": "https://www.suse.com/security/cve/CVE-2019-15222"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15222",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146531 for CVE-2019-15222",
"url": "https://bugzilla.suse.com/1146531"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15222",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158398 for CVE-2019-15222",
"url": "https://bugzilla.suse.com/1158398"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15222",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15222"
},
{
"cve": "CVE-2019-15239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15239",
"url": "https://www.suse.com/security/cve/CVE-2019-15239"
},
{
"category": "external",
"summary": "SUSE Bug 1146589 for CVE-2019-15239",
"url": "https://bugzilla.suse.com/1146589"
},
{
"category": "external",
"summary": "SUSE Bug 1156317 for CVE-2019-15239",
"url": "https://bugzilla.suse.com/1156317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15239"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15292"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15292",
"url": "https://www.suse.com/security/cve/CVE-2019-15292"
},
{
"category": "external",
"summary": "SUSE Bug 1146678 for CVE-2019-15292",
"url": "https://bugzilla.suse.com/1146678"
},
{
"category": "external",
"summary": "SUSE Bug 1173939 for CVE-2019-15292",
"url": "https://bugzilla.suse.com/1173939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15292"
},
{
"cve": "CVE-2019-15538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15538"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vector, but it might result as well in remote DoS if the XFS filesystem is exported for instance via NFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15538",
"url": "https://www.suse.com/security/cve/CVE-2019-15538"
},
{
"category": "external",
"summary": "SUSE Bug 1148093 for CVE-2019-15538",
"url": "https://bugzilla.suse.com/1148093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15538"
},
{
"cve": "CVE-2019-15666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15666"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15666",
"url": "https://www.suse.com/security/cve/CVE-2019-15666"
},
{
"category": "external",
"summary": "SUSE Bug 1148394 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "external",
"summary": "SUSE Bug 1172140 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1172140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15666"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15917"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15917",
"url": "https://www.suse.com/security/cve/CVE-2019-15917"
},
{
"category": "external",
"summary": "SUSE Bug 1149539 for CVE-2019-15917",
"url": "https://bugzilla.suse.com/1149539"
},
{
"category": "external",
"summary": "SUSE Bug 1156334 for CVE-2019-15917",
"url": "https://bugzilla.suse.com/1156334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15917"
},
{
"cve": "CVE-2019-15919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15919"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15919",
"url": "https://www.suse.com/security/cve/CVE-2019-15919"
},
{
"category": "external",
"summary": "SUSE Bug 1149552 for CVE-2019-15919",
"url": "https://bugzilla.suse.com/1149552"
},
{
"category": "external",
"summary": "SUSE Bug 1172957 for CVE-2019-15919",
"url": "https://bugzilla.suse.com/1172957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15919"
},
{
"cve": "CVE-2019-15920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15920"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15920",
"url": "https://www.suse.com/security/cve/CVE-2019-15920"
},
{
"category": "external",
"summary": "SUSE Bug 1149626 for CVE-2019-15920",
"url": "https://bugzilla.suse.com/1149626"
},
{
"category": "external",
"summary": "SUSE Bug 1156335 for CVE-2019-15920",
"url": "https://bugzilla.suse.com/1156335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "important"
}
],
"title": "CVE-2019-15920"
},
{
"cve": "CVE-2019-15921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15921"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15921",
"url": "https://www.suse.com/security/cve/CVE-2019-15921"
},
{
"category": "external",
"summary": "SUSE Bug 1149602 for CVE-2019-15921",
"url": "https://bugzilla.suse.com/1149602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "low"
}
],
"title": "CVE-2019-15921"
},
{
"cve": "CVE-2019-15924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15924"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15924",
"url": "https://www.suse.com/security/cve/CVE-2019-15924"
},
{
"category": "external",
"summary": "SUSE Bug 1149612 for CVE-2019-15924",
"url": "https://bugzilla.suse.com/1149612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "low"
}
],
"title": "CVE-2019-15924"
},
{
"cve": "CVE-2019-15926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15926"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15926",
"url": "https://www.suse.com/security/cve/CVE-2019-15926"
},
{
"category": "external",
"summary": "SUSE Bug 1149527 for CVE-2019-15926",
"url": "https://bugzilla.suse.com/1149527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15926"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.16.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.16.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-14T15:15:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:1889-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-195 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)\n\nThis update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1889,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1889",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1889-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1889-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191889-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1889-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE Bug 1140747",
"url": "https://bugzilla.suse.com/1140747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2019-07-18T12:06:21Z",
"generator": {
"date": "2019-07-18T12:06:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1889-1",
"initial_release_date": "2019-07-18T12:06:21Z",
"revision_history": [
{
"date": "2019-07-18T12:06:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-195-default-4-10.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-195-default-4-10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-18T12:06:21Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-4-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-18T12:06:21Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
}
]
}
suse-su-2019:2950-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#11465).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s KVM\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver\n (bnc#1146163).\n\n- CVE-2019-10207: Add checks for missing tty operations to prevent unprivileged\n user to execute 0x0 address (bsc#1142857 bsc#1123959)\n\n- CVE-2019-15118: ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term\n leading to kernel stack exhaustion (bsc#1145922).\n\nThe following non-security bugs were fixed:\n\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- hpsa: move lockup_detected attribute to host attr (bsc#999278, bsc#1153119).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1137944).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- tcp: Be more careful in tcp_fragment() (bsc#1137586 bsc#1139751).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2950,SUSE-SLE-Module-Public-Cloud-12-2019-2950,SUSE-SLE-SAP-12-SP1-2019-2950,SUSE-SLE-SERVER-12-SP1-2019-2950",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2950-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2950-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2950-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1123959",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1137944",
"url": "https://bugzilla.suse.com/1137944"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1139751",
"url": "https://bugzilla.suse.com/1139751"
},
{
"category": "self",
"summary": "SUSE Bug 1142857",
"url": "https://bugzilla.suse.com/1142857"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145477",
"url": "https://bugzilla.suse.com/1145477"
},
{
"category": "self",
"summary": "SUSE Bug 1145922",
"url": "https://bugzilla.suse.com/1145922"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146163",
"url": "https://bugzilla.suse.com/1146163"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146378",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146413",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "self",
"summary": "SUSE Bug 1146425",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "self",
"summary": "SUSE Bug 1146512",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "self",
"summary": "SUSE Bug 1146514",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "self",
"summary": "SUSE Bug 1146516",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146524",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "self",
"summary": "SUSE Bug 1146526",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "self",
"summary": "SUSE Bug 1146529",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146543",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "self",
"summary": "SUSE Bug 1146547",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "self",
"summary": "SUSE Bug 1146584",
"url": "https://bugzilla.suse.com/1146584"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1147122",
"url": "https://bugzilla.suse.com/1147122"
},
{
"category": "self",
"summary": "SUSE Bug 1148938",
"url": "https://bugzilla.suse.com/1148938"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1149527",
"url": "https://bugzilla.suse.com/1149527"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1151347",
"url": "https://bugzilla.suse.com/1151347"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1153119",
"url": "https://bugzilla.suse.com/1153119"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 999278",
"url": "https://bugzilla.suse.com/999278"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10906 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18551 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15215 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15505 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15807 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16413 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:12:17Z",
"generator": {
"date": "2019-11-12T18:12:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2950-1",
"initial_release_date": "2019-11-12T18:12:17Z",
"revision_history": [
{
"date": "2019-11-12T18:12:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-docs-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-docs-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.124.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-vanilla-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-vanilla-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10906"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10906",
"url": "https://www.suse.com/security/cve/CVE-2016-10906"
},
{
"category": "external",
"summary": "SUSE Bug 1146584 for CVE-2016-10906",
"url": "https://bugzilla.suse.com/1146584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2016-10906"
},
{
"cve": "CVE-2017-18509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18509"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18509",
"url": "https://www.suse.com/security/cve/CVE-2017-18509"
},
{
"category": "external",
"summary": "SUSE Bug 1145477 for CVE-2017-18509",
"url": "https://bugzilla.suse.com/1145477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2017-18551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18551"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18551",
"url": "https://www.suse.com/security/cve/CVE-2017-18551"
},
{
"category": "external",
"summary": "SUSE Bug 1146163 for CVE-2017-18551",
"url": "https://bugzilla.suse.com/1146163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18551"
},
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14815"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14815",
"url": "https://www.suse.com/security/cve/CVE-2019-14815"
},
{
"category": "external",
"summary": "SUSE Bug 1146514 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14815"
},
{
"cve": "CVE-2019-14816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14816"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14816",
"url": "https://www.suse.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "SUSE Bug 1146516 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "external",
"summary": "SUSE Bug 1173666 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1173666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14816"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15118"
}
],
"notes": [
{
"category": "general",
"text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15118",
"url": "https://www.suse.com/security/cve/CVE-2019-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1145922 for CVE-2019-15118",
"url": "https://bugzilla.suse.com/1145922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15118"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15215"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15215",
"url": "https://www.suse.com/security/cve/CVE-2019-15215"
},
{
"category": "external",
"summary": "SUSE Bug 1146425 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15215"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15218"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15218",
"url": "https://www.suse.com/security/cve/CVE-2019-15218"
},
{
"category": "external",
"summary": "SUSE Bug 1146413 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15218"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15220",
"url": "https://www.suse.com/security/cve/CVE-2019-15220"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146526 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15220"
},
{
"cve": "CVE-2019-15221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15221"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15221",
"url": "https://www.suse.com/security/cve/CVE-2019-15221"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146529 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15221"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15505"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15505",
"url": "https://www.suse.com/security/cve/CVE-2019-15505"
},
{
"category": "external",
"summary": "SUSE Bug 1147122 for CVE-2019-15505",
"url": "https://bugzilla.suse.com/1147122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15505"
},
{
"cve": "CVE-2019-15807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15807",
"url": "https://www.suse.com/security/cve/CVE-2019-15807"
},
{
"category": "external",
"summary": "SUSE Bug 1148938 for CVE-2019-15807",
"url": "https://bugzilla.suse.com/1148938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15807"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15926"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15926",
"url": "https://www.suse.com/security/cve/CVE-2019-15926"
},
{
"category": "external",
"summary": "SUSE Bug 1149527 for CVE-2019-15926",
"url": "https://bugzilla.suse.com/1149527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15926"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16413"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16413",
"url": "https://www.suse.com/security/cve/CVE-2019-16413"
},
{
"category": "external",
"summary": "SUSE Bug 1151347 for CVE-2019-16413",
"url": "https://bugzilla.suse.com/1151347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-16413"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:1534-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP2 kernel version 4.4.121 was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote\n attacker such that one can trigger an integer overflow, leading to a kernel\n panic. (bsc#1137586).\n\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which\n would fragment the TCP retransmission queue. A remote attacker may have been\n able to further exploit the fragmented queue to cause an expensive linked-list\n walk for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which\n would fragment the RACK send map. A remote attacker may be able to further\n exploit the fragmented send map to cause an expensive linked-list walk for\n subsequent SACKs received for that same TCP connection. This would have\n resulted in excess resource consumption due to low mss values.\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly\n escalate privileges was found in the mwifiex kernel module while connecting\n to a malicious wireless network. (bnc#1136424)\n\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c in the Linux kernel There is an unchecked\n kstrdup of fwstr, which may have allowed an attacker to cause a denial of service\n (NULL pointer dereference and system crash). (bnc#1136586)\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may have been possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server. (bnc#1120843)\n\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the\n unused memory region in the extent tree block, which might have allowed local users\n to obtain sensitive information by reading uninitialized data in the\n filesystem. (bnc#1135281)\n\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was\n not called before register_netdevice. This allowed local users to cause a denial of \n service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev\n name containing a / character. This is similar to CVE-2013-4343. (bnc#1135603)\n\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid\n programs (such as /bin/su) because install_exec_creds() is called too late in\n load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check\n had a race condition when reading /proc/pid/stat. (bnc#1131543)\n\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c\n in the Linux kernel There was a race condition leading to a use-after-free,\n related to net namespace cleanup. (bnc#1134537)\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a HIDPCONNADD command, because a\n name field may not have ended with a \u0027\\0\u0027 character. (bnc#1134848)\n\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in\n fs/proc/base.c in the Linux kernel It did not ensure that only root may\n inspect the kernel stack of an arbitrary task, allowing a local attacker to\n exploit racy stack unwinding and leak kernel task stack contents.\n (bnc#1110785)\n\nThe following non-security bugs were fixed:\n\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1134596).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1134596).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1534,SUSE-OpenStack-Cloud-7-2019-1534,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1534,SUSE-SLE-HA-12-SP2-2019-1534,SUSE-SLE-SAP-12-SP2-2019-1534,SUSE-SLE-SERVER-12-SP2-2019-1534,SUSE-SLE-SERVER-12-SP2-BCL-2019-1534,SUSE-Storage-4-2019-1534",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1534-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1534-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1534-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1113769",
"url": "https://bugzilla.suse.com/1113769"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120885",
"url": "https://bugzilla.suse.com/1120885"
},
{
"category": "self",
"summary": "SUSE Bug 1131543",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1132374",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134596",
"url": "https://bugzilla.suse.com/1134596"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:22:06Z",
"generator": {
"date": "2019-06-17T17:22:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1534-1",
"initial_release_date": "2019-06-17T17:22:06Z",
"revision_history": [
{
"date": "2019-06-17T17:22:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.114.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.114.1.aarch64",
"product_id": "kernel-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.114.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.114.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.114.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.114.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.114.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.114.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.114.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.114.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.114.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.114.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.114.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.114.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.114.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.114.1.noarch",
"product_id": "kernel-devel-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.114.1.noarch",
"product_id": "kernel-docs-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.114.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.114.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.114.1.noarch",
"product_id": "kernel-macros-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.114.1.noarch",
"product_id": "kernel-source-4.4.121-92.114.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.114.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.114.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.114.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.114.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.114.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.114.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.114.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.114.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.114.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.114.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.114.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.114.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.114.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.114.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.114.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.114.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.114.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.114.1.s390x",
"product_id": "kernel-syms-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.114.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.114.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.114.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.114.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.114.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.114.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.114.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.114.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.114.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.114.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.114.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.114.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.114.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.114.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.114.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.114.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.114.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.114.1.x86_64",
"product_id": "kernel-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.114.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.114.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.114.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.114.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.114.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.114.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.114.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.114.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.114.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.114.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.114.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.114.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.114.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.114.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.114.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.114.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.114.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.114.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.114.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.114.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.114.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.114.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.114.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.114.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.114.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.114.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.114.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.114.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.114.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_114-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1536-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThe SUSE Linux Enterprise 12 SP4 kernel was updated to 4.12.14 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM existed. It could have occured with FUSE requests. (bnc#1133190)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bnc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpica: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).\n- acpi: fix menuconfig presentation of ACPI submenu (bsc#1117158).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: fix ACPI dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- asoc: fix valid stream condition (bsc#1051510).\n- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- asoc: stm32: fix sai driver name initialisation (bsc#1051510).\n- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: treat stale dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix rtnh_ok() (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- git_sort: add crypto maintainer tree.\n- git-sort: Always explicitely handle a pygit2 import error As pointed out by Michal Suchanek, the limitation in commit 6d67b1042a73 (\u0027series_sort: Catch pygit2 import failure.\u0027) is wrong; given that there is no explicit installation step of the git-sort scripts and that they are \u0027just there\u0027 in the kernel-source repository, every user-callable script needs to check that the user followed installation requirements.\n- git-sort: Handle new pygit2.discover_repository behavior A consequence of pygit2 commit c32ee0c25384 (\u0027Now discover_repository returns None if repo not found\u0027).\n- git-sort: Move mainline remote check to series_sort git_sort can be used on any git repository. series_sort() OTOH expects the reference repository to be a clone of the mainline Linux kernel repository. Move the warning accordingly and make it an error since further operations would fail. Fixes: 027d52475873 (\u0027scripts: git_sort: Warn about missing upstream repo\u0027)\n- git-sort: README: Add information about how to report problems\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- hid: input: add mapping for Assistant key (bsc#1051510).\n- hid: input: add mapping for Expose/Overview key (bsc#1051510).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- hid: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- input: introduce KEY_ASSISTANT (bsc#1051510).\n- input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix stats update from local clients (git-fixes).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI: protect dma-mapping.h include (kabi).\n- kABI: protect functions using struct net_generic (bsc#1130409 LTC#176346).\n- kABI: protect ip_options_rcv_srr (kabi).\n- kABI: protect struct mlx5_td (kabi).\n- kABI: protect struct pci_dev (kabi).\n- kABI: protect struct smcd_dev (bsc#1130409 LTC#176346).\n- kABI: protect struct smc_ib_device (bsc#1130409 LTC#176346).\n- kABI: protect struct smc_link (bsc#1129857 LTC#176247).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128905 LTC#176077).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev-\u003ebitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mtd: docg3: fix a possible memory leak of mtd-\u003ename (bsc#1051510).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: legacy: do not unmask port bitmaps (git-fixes).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).\n- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).\n- netfilter: drop template ct when conntrack is skipped (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net/smc: add pnet table namespace support (bsc#1130409 LTC#176346).\n- net/smc: add smcd support to the pnet table (bsc#1130409 LTC#176346).\n- net/smc: allow 16 byte pnetids in netlink policy (bsc#1129857 LTC#176247).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1130409 LTC#176346).\n- net/smc: allow pnetid-less configuration (bsc#1130409 LTC#176346).\n- net/smc: call smc_cdc_msg_send() under send_lock (bsc#1129857 LTC#176247).\n- net/smc: check connections in smc_lgr_free_work (bsc#1129857 LTC#176247).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: check port_idx of ib event (bsc#1129857 LTC#176247).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1130409 LTC#176346).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: correct state change for peer closing (bsc#1129857 LTC#176247).\n- net/smc: delete rkey first before switching to unused (bsc#1129857 LTC#176247).\n- net/smc: do not wait for send buffer space when data was already sent (bsc#1129857 LTC#176247).\n- net/smc: do not wait under send_lock (bsc#1129857 LTC#176247).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix another sizeof to int comparison (bsc#1129857 LTC#176247).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix byte_order for rx_curs_confirmed (bsc#1129848 LTC#176249).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: fix sender_free computation (bsc#1129857 LTC#176247).\n- net/smc: fix smc_poll in SMC_INIT state (bsc#1129848 LTC#176249).\n- net/smc: fix use of variable in cleared area (bsc#1129857 LTC#176247).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move code to clear the conn-\u003elgr field (bsc#1129857 LTC#176247).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: move wake up of close waiter (bsc#1129857 LTC#176247).\n- net/smc: no delay for free tx buffer wait (bsc#1129857 LTC#176247).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: postpone release of clcsock (bsc#1129857 LTC#176247).\n- net/smc: preallocated memory for rdma work requests (bsc#1129857 LTC#176247).\n- net/smc: prevent races between smc_lgr_terminate() and smc_conn_free() (bsc#1129857 LTC#176247).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: recvmsg and splice_read should return 0 after shutdown (bsc#1129857 LTC#176247).\n- net/smc: reduce amount of status updates to peer (bsc#1129857 LTC#176247).\n- net/smc: reset cursor update required flag (bsc#1129857 LTC#176247).\n- net/smc: rework pnet table (bsc#1130409 LTC#176346).\n- net/smc: unlock LGR pending lock earlier for SMC-D (bsc#1129857 LTC#176247).\n- net/smc: use client and server LGR pending locks for SMC-R (bsc#1129857 LTC#176247).\n- net/smc: use device link provided in qp_context (bsc#1129857 LTC#176247).\n- net/smc: use smc_curs_copy() for SMC-D (bsc#1129857 LTC#176247).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- nfs: add module option to limit NFSv4 minor version (jsc#PM-231).\n- nfs: Update config files for NFSv4.2 Enable NFSv4.2 support - jsc@PM-231 This requires a module parameter for NFSv4.2 to actually be available on SLE12 and SLE15-SP0\n- nfsv4.x: always serialize open/close operations (bsc#1114893).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- packet: validate msg_namelen in send directly (git-fixes).\n- pci: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- pci: Factor out pcie_retrain_link() function (git-fixes).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- pci: Work around Pericom pcie-to-pci bridge Retrain Link erratum (git-fixes).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- proc/kcore: do not bounds check against address 0 (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- re-export snd_cards for kABI compatibility (bsc#1051510).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- Revert \u0027ALSA: seq: Protect in-kernel ioctl calls with mutex\u0027 (bsc#1051510).\n- Revert \u0027block: unexport DISK_EVENT_MEDIA_CHANGE for legacy/fringe drivers\u0027 (bsc#1110946, bsc#1119843).\n- Revert \u0027drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\u0027 The patch seems buggy, breaks the build for armv7hl/pae config.\n- Revert \u0027ide: unexport DISK_EVENT_MEDIA_CHANGE for ide-gd and ide-cd\u0027 (bsc#1110946).\n- Revert \u0027tty: pty: Fix race condition between release_one_tty and pty_write\u0027 (bsc#1051510).\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- s390/ism: ignore some errors during deregistration (bsc#1129857 LTC#176247).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- scripts/bugzilla-create: Set \u0027Proactive-Upstream-Fix\u0027 keyword\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- sctp: only update outstanding_bytes for transmitted queue when doing prsctp_prune (git-fixes).\n- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- smc: move unhash as early as possible in smc_release() (bsc#1129857 LTC#176247).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: serial_core, add -\u003einstall (bnc#1129693).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb: cdc-acm: fix unthrottle races (bsc#1051510).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- usb: serial: fix unthrottle races (bsc#1051510).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- usb: yurex: Fix protection fault after device removal (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm: Return error on unknown encap_type in init_state (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1536,SUSE-SLE-SERVER-12-SP4-2019-1536",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1536-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1536-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1536-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1114893",
"url": "https://bugzilla.suse.com/1114893"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119843",
"url": "https://bugzilla.suse.com/1119843"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128905",
"url": "https://bugzilla.suse.com/1128905"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129497",
"url": "https://bugzilla.suse.com/1129497"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1129848",
"url": "https://bugzilla.suse.com/1129848"
},
{
"category": "self",
"summary": "SUSE Bug 1129857",
"url": "https://bugzilla.suse.com/1129857"
},
{
"category": "self",
"summary": "SUSE Bug 1130409",
"url": "https://bugzilla.suse.com/1130409"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1132894",
"url": "https://bugzilla.suse.com/1132894"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134591",
"url": "https://bugzilla.suse.com/1134591"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134607",
"url": "https://bugzilla.suse.com/1134607"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:24:44Z",
"generator": {
"date": "2019-06-17T17:24:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1536-1",
"initial_release_date": "2019-06-17T17:24:44Z",
"revision_history": [
{
"date": "2019-06-17T17:24:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-6.15.2.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-6.15.2.noarch",
"product_id": "kernel-devel-azure-4.12.14-6.15.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-6.15.2.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-6.15.2.noarch",
"product_id": "kernel-source-azure-4.12.14-6.15.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-6.15.2.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-6.15.2.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-6.15.2.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-azure-4.12.14-6.15.2.x86_64",
"product_id": "kernel-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-6.15.2.x86_64",
"product_id": "kernel-azure-base-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-6.15.2.x86_64",
"product_id": "kernel-azure-devel-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-6.15.2.x86_64",
"product_id": "kernel-azure-extra-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-azure-kgraft-4.12.14-6.15.2.x86_64",
"product_id": "kernel-azure-kgraft-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-6.15.2.x86_64",
"product_id": "kernel-syms-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-6.15.2.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-6.15.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-6.15.2.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-6.15.2.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-6.15.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-6.15.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-6.15.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-6.15.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-6.15.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-6.15.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-6.15.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-6.15.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-6.15.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-6.15.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-6.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.15.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:24:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1674-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-95_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics may allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1135280).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1674,SUSE-SLE-Live-Patching-12-SP4-2019-1666,SUSE-SLE-Live-Patching-12-SP4-2019-1674,SUSE-SLE-Live-Patching-12-SP4-2019-1679",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1674-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1674-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191674-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1674-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1135280",
"url": "https://bugzilla.suse.com/1135280"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP4)",
"tracking": {
"current_release_date": "2019-06-21T16:11:57Z",
"generator": {
"date": "2019-06-21T16:11:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1674-1",
"initial_release_date": "2019-06-21T16:11:57Z",
"revision_history": [
{
"date": "2019-06-21T16:11:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"product_id": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:57Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:57Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:57Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:57Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-5-2.13.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:57Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1882-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-150_17 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).\n\nThis update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1882,SUSE-SLE-Module-Live-Patching-15-2019-1878,SUSE-SLE-Module-Live-Patching-15-2019-1879,SUSE-SLE-Module-Live-Patching-15-2019-1880,SUSE-SLE-Module-Live-Patching-15-2019-1881,SUSE-SLE-Module-Live-Patching-15-2019-1882,SUSE-SLE-Module-Live-Patching-15-2019-1883,SUSE-SLE-Module-Live-Patching-15-2019-1884,SUSE-SLE-Module-Live-Patching-15-2019-1885,SUSE-SLE-Module-Live-Patching-15-2019-1886,SUSE-SLE-Module-Live-Patching-15-2019-1887",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1882-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1882-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191882-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1882-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE Bug 1140747",
"url": "https://bugzilla.suse.com/1140747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15)",
"tracking": {
"current_release_date": "2019-07-18T12:05:57Z",
"generator": {
"date": "2019-07-18T12:05:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1882-1",
"initial_release_date": "2019-07-18T12:05:57Z",
"revision_history": [
{
"date": "2019-07-18T12:05:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-18T12:05:57Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-18T12:05:57Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-8-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-11-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-18T12:05:57Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1550-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which\n triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of\n service. (bsc#1138291)\n\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c\n may return NULL. If the caller does not check for this, it will trigger a\n NULL pointer dereference. This will cause denial of service. This used to\n affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can\n trigger an integer overflow, leading to a kernel panic.\n\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which\n will fragment the TCP retransmission queue. An attacker may have been able to\n further exploit the fragmented queue to cause an expensive linked-list walk\n for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its\n responses into multiple TCP segments. This would drastically increased the\n bandwidth required to deliver the same amount of data. Further, it would\n consume additional resources such as CPU and NIC processing power.\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly\n escalate privileges was found in the mwifiex kernel module while connecting\n to a malicious wireless network. (bsc#1136424)\n\n- CVE-2019-10124: An issue was discovered in the hwpoison implementation in\n mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs\n on a thp tail page after pmd is split, an attacker could cause a denial of\n service (bsc#1130699, CVE-2019-10124).\n\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked\n kstrdup of fwstr, which might allow an attacker to cause a denial of service\n (NULL pointer dereference and system crash). (bsc#1136586)\n\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with\n resultant use-after-free issues, if about 140 GiB of RAM exists. This is\n related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h,\n include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c.\n It could occur with FUSE requests. (bbsc#1133190)\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may be possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server. (bsc#1120843)\n\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the\n unused memory region in the extent tree block, which might allow local users\n to obtain sensitive information by reading uninitialized data in the\n filesystem. (bsc#1135281)\n\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM):\n Uncacheable memory on some microprocessors utilizing speculative execution\n may have allowed an authenticated user to potentially enable information\n disclosure via a side channel with local access. A list of impacted products\n can be found here:\n https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.\n (bsc##1111331)\n\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name\n was not called before register_netdevice. This allowed local users to cause a\n denial of service (NULL pointer dereference and panic) via an\n ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)\n\n- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer\n Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing\n speculative execution which may have allowed an authenticated user to\n potentially enable information disclosure via a side channel with local\n access. A list of impacted products can be found here:\n https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.\n (bsc#1103186)\n\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in\n Intel(R) i915 Graphics for Linux may have allowed an authenticated user to\n potentially enable escalation of privilege via local access. (bsc#1135278)\n\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c\n in the Linux kernel There was a race condition leading to a use-after-free,\n related to net namespace cleanup. (bsc#1135278)\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a hidPCONNADD command, because a\n name field may not end with a \u0027\\0\u0027 character. (bsc#1134848)\n\n- CVE-2019-11811: An issue was discovered in the Linux kernel There was a\n use-after-free upon attempted read access to /proc/ioports after the ipmi_si\n module was removed, related to drivers/char/ipmi/ipmi_si_intf.c,\n drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.\n (bsc#1134397)\n\n- CVE-2019-11486: The Siemens R3964 line discipline driver in\n drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions.\n (bsc#1133188)\n\n- CVE-2019-9003: In the Linux kernel, attackers could trigger a\n drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for\n certain simultaneous execution of the code, as demonstrated by a \u0027service\n ipmievd restart\u0027 loop. (bsc#1126704)\n\n- CVE-2018-16880: A flaw was found in the Linux kernel\u0027s handle_rx() function\n in the [vhost_net] driver. A malicious virtual guest, under specific\n conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a\n virtual host which may have lead to a kernel memory corruption and a system\n panic. Due to the nature of the flaw, privilege escalation cannot be fully\n ruled out.(bsc#1122767)\n\n- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame\n validation could be bypassed. (bsc#1132828)\n\n- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer\n overflow. (bsc#1132681)\n\n- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame\n validation could be bypassed. (bsc#1132673)\n\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution\n and branch prediction may have allowed unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis.\n\n- CVE-2019-3882: A flaw was found in the Linux kernel\u0027s vfio interface\n implementation that permitted violation of the user\u0027s locked memory limit. If\n a device was bound to a vfio driver, such as vfio-pci, and the local attacker\n is administratively granted ownership of the device, it may have caused a\n system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- 9p: do not trust pdu content for stat item size (bsc#1051510).\n- acpi / SBS: Fix GPE storm on recent MacBookPro\u0027s (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi: Add Hygon Dhyana support ().\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).\n- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).\n- acpica: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).\n- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).\n- alsa: core: Fix card races between register and disconnect (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).\n- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).\n- alsa: hda: Initialize power_state field properly (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- asoc: fix valid stream condition (bsc#1051510).\n- asoc: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).\n- asoc: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).\n- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- asoc: stm32: fix sai driver name initialisation (bsc#1051510).\n- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- asoc: topology: free created components in tplg load error (bsc#1051510).\n- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1127371).\n- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).\n- ath10k: avoid possible string overflow (bsc#1051510).\n- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bitmap: Add bitmap_alloc(), bitmap_zalloc() and bitmap_free() (jsc#SLE-4797).\n- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).\n- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).\n- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).\n- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).\n- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).\n- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).\n- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).\n- blkcg: Introduce blkg_root_lookup() (bsc#1131673).\n- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).\n- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- block: Introduce blk_exit_queue() (bsc#1131673).\n- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).\n- block: remove bio_rewind_iter() (bsc#1131673).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).\n- bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix spelling mistake \u0027dicline\u0027 -\u003e \u0027decline\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Remove set but not used variable \u0027mfw_vn\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Drop oversize TX packets to prevent errors (networking-stable-19_03_07).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bonding: fix PACKET_ORIGDEV regression (git-fixes).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: fix use after free in bpf_evict_inode (bsc#1083647).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).\n- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: Avoid possible qgroup_rsv_size overflow in btrfs_calculate_inode_block_rsv_size (git-fixes).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).\n- btrfs: Fix bound checking in qgroup_trace_new_subtree_blocks (git-fixes).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).\n- cgroup: fix parsing empty mount option string (bsc#1133094).\n- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).\n- cifs: Do not count -ENODATA as failure for query directory (bsc#1051510).\n- cifs: do not dereference smb_file_target before null check (bsc#1051510).\n- cifs: Do not hide EINTR after sending network packets (bsc#1051510).\n- cifs: Do not reconnect TCP session in add_credits() (bsc#1051510).\n- cifs: Do not reset lease state to NONE on lease break (bsc#1051510).\n- cifs: Fix adjustment of credits for MTU requests (bsc#1051510).\n- cifs: Fix credit calculation for encrypted reads with errors (bsc#1051510).\n- cifs: Fix credits calculations for reads with errors (bsc#1051510).\n- cifs: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- cifs: Fix possible hang during async MTU reads and writes (bsc#1051510).\n- cifs: Fix potential OOB access of lock element array (bsc#1051510).\n- cifs: Fix read after write for files with read caching (bsc#1051510).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).\n- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).\n- config: arm64: enable CN99xx uncore pmu References: bsc#1117114\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- cpufreq: Add Hygon Dhyana support ().\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- cpupowerutils: bench - Fix cpu online check (bsc#1051510).\n- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).\n- crypto: caam - add missing put_device() call (bsc#1129770).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).\n- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).\n- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).\n- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix passing zero to \u0027PTR_ERR\u0027 warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variable \u0027kctx_len\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variables \u0027adap\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove set but not used variables \u0027err, adap, request, hws\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).\n- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).\n- crypto: qat - move temp buffers off the stack (jsc#SLE-4818).\n- crypto: qat - no need to check return value of debugfs_create functions (jsc#SLE-4818).\n- crypto: qat - Remove unused goto label (jsc#SLE-4818).\n- crypto: qat - Remove VLA usage (jsc#SLE-4818).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).\n- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).\n- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).\n- cxgb4/cxgb4vf: Fix up netdev-\u003ehw_features (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Link management changes (bsc#1127371).\n- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).\n- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).\n- cxgb4: Add flag tc_flower_initialized (bsc#1127371).\n- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).\n- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).\n- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).\n- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).\n- cxgb4: add support to display DCB info (bsc#1127371).\n- cxgb4: Add support to read actual provisioned resources (bsc#1127371).\n- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).\n- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).\n- cxgb4: collect hardware queue descriptors (bsc#1127371).\n- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).\n- cxgb4: convert flower table to use rhashtable (bsc#1127371).\n- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).\n- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).\n- cxgb4: display number of rx and tx pages free (bsc#1127371).\n- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).\n- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).\n- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).\n- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).\n- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).\n- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).\n- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).\n- cxgb4: remove set but not used variables \u0027multitrc, speed\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).\n- cxgb4: remove the unneeded locks (bsc#1127371).\n- cxgb4: Revert \u0027cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).\n- cxgb4: Support ethtool private flags (bsc#1127371).\n- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).\n- cxgb4: update supported DCB version (bsc#1127371).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).\n- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Few more link management changes (bsc#1127374).\n- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).\n- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- device_cgroup: fix RCU imbalance in error case (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).\n- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).\n- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).\n- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: perf: Add documentation for ThunderX2 PMU uncore driver ().\n- drivers/perf: Add Cavium ThunderX2 SoC UNCORE PMU driver ().\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).\n- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).\n- drm/amd/display: extending AUX SW Timeout (bsc#1111666).\n- drm/amd/display: fix cursor black issue (bsc#1111666).\n- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).\n- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).\n- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/doc: Drop \u0027content type\u0027 from the legacy kms property table (bsc#1111666).\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)\n- drm/i915/gvt: Annotate iomem usage (bsc#1051510).\n- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/gvt: Roundup fb-\u003eheight into tile\u0027s height at calucation fb-\u003esize (bsc#1111666).\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/nouveau/bar/tu104: initial support (bsc#1133593).\n- drm/nouveau/bar/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios/tu104: initial support (bsc#1133593).\n- drm/nouveau/bios/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios: translate additional memory types (bsc#1133593).\n- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).\n- drm/nouveau/bus/tu104: initial support (bsc#1133593).\n- drm/nouveau/bus/tu106: initial support (bsc#1133593).\n- drm/nouveau/ce/tu104: initial support (bsc#1133593).\n- drm/nouveau/ce/tu106: initial support (bsc#1133593).\n- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).\n- drm/nouveau/core: recognise TU102 (bsc#1133593).\n- drm/nouveau/core: recognise TU104 (bsc#1133593).\n- drm/nouveau/core: recognise TU106 (bsc#1133593).\n- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).\n- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).\n- drm/nouveau/devinit/tu104: initial support (bsc#1133593).\n- drm/nouveau/devinit/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).\n- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).\n- drm/nouveau/disp/tu104: initial support (bsc#1133593).\n- drm/nouveau/disp/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).\n- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).\n- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).\n- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).\n- drm/nouveau/dma/tu104: initial support (bsc#1133593).\n- drm/nouveau/dma/tu106: initial support (bsc#1133593).\n- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).\n- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).\n- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).\n- drm/nouveau/fault/tu104: initial support (bsc#1133593).\n- drm/nouveau/fault/tu106: initial support (bsc#1133593).\n- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).\n- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).\n- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).\n- drm/nouveau/fb/tu104: initial support (bsc#1133593).\n- drm/nouveau/fb/tu106: initial support (bsc#1133593).\n- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).\n- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).\n- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).\n- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).\n- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).\n- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).\n- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).\n- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).\n- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).\n- drm/nouveau/fifo/tu104: initial support (bsc#1133593).\n- drm/nouveau/fifo/tu106: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu104: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu106: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu104: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu104: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/nouveau/ibus/tu104: initial support (bsc#1133593).\n- drm/nouveau/ibus/tu106: initial support (bsc#1133593).\n- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).\n- drm/nouveau/imem/tu104: initial support (bsc#1133593).\n- drm/nouveau/imem/tu106: initial support (bsc#1133593).\n- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).\n- drm/nouveau/kms/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mc/tu104: initial support (bsc#1133593).\n- drm/nouveau/mc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).\n- drm/nouveau/pci/tu104: initial support (bsc#1133593).\n- drm/nouveau/pci/tu106: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/therm/tu104: initial support (bsc#1133593).\n- drm/nouveau/therm/tu106: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu104: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu106: initial support (bsc#1133593).\n- drm/nouveau/top/tu104: initial support (bsc#1133593).\n- drm/nouveau/top/tu106: initial support (bsc#1133593).\n- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).\n- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).\n- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).\n- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).\n- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).\n- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).\n- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).\n- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).\n- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).\n- drm/nouveau: register backlight on pascal and newer (bsc#1133593).\n- drm/nouveau: remove left-over struct member (bsc#1133593).\n- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).\n- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).\n- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).\n- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).\n- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).\n- drm/pl111: Initialize clock spinlock early (bsc#1111666).\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1111666).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)\n- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)\n- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)\n- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY configuration for \u003e 148.5 MHz (bsc#1111666).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)\n- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).\n- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)\n- drm/tegra: gem: Fix CPU-cache maintenance for BO\u0027s allocated using get_pages() (bsc#1111666).\n- drm/tegra: hub: Fix dereference before check (bsc#1111666).\n- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).\n- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/udl: add a release method and delay modeset teardown (bsc#1085536)\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: Remove set but not used variable \u0027restart\u0027 (bsc#1111666).\n- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)\n- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).\n- dsa: mv88e6xxx: Ensure all pending interrupts are handled prior to exit (networking-stable-19_02_20).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- e1000e: Disable runtime PM on CNP+ (jsc#SLE-4804).\n- e1000e: Exclude device from suspend direct complete optimization (jsc#SLE-4804).\n- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).\n- e1000e: fix a missing check for return value (jsc#SLE-4804).\n- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support ().\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix cgroup_do_mount() handling of failure exits (bsc#1133095).\n- fix rtnh_ok() (git-fixes).\n- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).\n- fm10k: TRIVIAL cleanup of extra spacing in function comment (jsc#SLE-4796).\n- fm10k: use struct_size() in kzalloc() (jsc#SLE-4796).\n- fs/nfs: Fix nfs_parse_devname to not modify it\u0027s argument (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- futex: Cure exit race (bsc#1050549).\n- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).\n- futex: Handle early deadlock return correctly (bsc#1050549).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).\n- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- gre6: use log_ecn_error module parameter in ip6_tnl_rcv() (git-fixes).\n- hid: core: move Usage Page concatenation to Main item (bsc#1093389).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- hid: i2c-hid: Ignore input report if there\u0027s no data present on Elan touchpanels (bsc#1133486).\n- hid: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- hid: input: add mapping for Assistant key (bsc#1051510).\n- hid: input: add mapping for Expose/Overview key (bsc#1051510).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hid: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).\n- hid: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).\n- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- hv_netvsc: Fix IP header checksum for coalesced packets (networking-stable-19_03_07).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).\n- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).\n- i40e: Able to add up to 16 MAC filters on an untrusted VF (jsc#SLE-4797).\n- i40e: add new pci id for X710/XXV710 N3000 cards (jsc#SLE-4797).\n- i40e: add num_vectors checker in iwarp handler (jsc#SLE-4797).\n- i40e: Add support FEC configuration for Fortville 25G (jsc#SLE-4797).\n- i40e: Add support for X710 B/P and SFP+ cards (jsc#SLE-4797).\n- i40e: add tracking of AF_XDP ZC state for each queue pair (jsc#SLE-4797).\n- i40e: change behavior on PF in response to MDD event (jsc#SLE-4797).\n- i40e: Change unmatched function types (jsc#SLE-4797).\n- i40e: Changed maximum supported FW API version to 1.8 (jsc#SLE-4797).\n- i40e: check queue pairs num in config queues handler (jsc#SLE-4797).\n- i40e: clean up several indentation issues (jsc#SLE-4797).\n- i40e: do not allow changes to HW VLAN stripping on active port VLANs (jsc#SLE-4797).\n- i40e: Fix for 10G ports LED not blinking (jsc#SLE-4797).\n- i40e: Fix for allowing too many MDD events on VF (jsc#SLE-4797).\n- i40e: fix i40e_ptp_adjtime when given a negative delta (jsc#SLE-4797).\n- i40e: Fix misleading error message (jsc#SLE-4797).\n- i40e: fix misleading message about promisc setting on un-trusted VF (jsc#SLE-4797).\n- i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c (jsc#SLE-4797).\n- i40e: Fix the typo in adding 40GE KR4 mode (jsc#SLE-4797).\n- i40e: Further implementation of LLDP (jsc#SLE-4797).\n- i40e: Implement DDP support in i40e driver (jsc#SLE-4797).\n- i40e: increase indentation (jsc#SLE-4797).\n- i40e: Introduce recovery mode support (jsc#SLE-4797).\n- i40e: Limiting RSS queues to CPUs (jsc#SLE-4797).\n- i40e: Memory leak in i40e_config_iwarp_qvlist (jsc#SLE-4797).\n- i40e: missing input validation on VF message handling by the PF (jsc#SLE-4797).\n- i40e: move i40e_xsk_umem function (jsc#SLE-4797).\n- i40e: print pci vendor and device ID during probe (jsc#SLE-4797).\n- i40e: Queues are reserved despite \u0027Invalid argument\u0027 error (jsc#SLE-4797).\n- i40e: remove debugfs tx_timeout support (jsc#SLE-4797).\n- i40e: remove error msg when vf with port vlan tries to remove vlan 0 (jsc#SLE-4797).\n- i40e: Remove misleading messages for untrusted VF (jsc#SLE-4797).\n- i40e: remove out-of-range comparisons in i40e_validate_cloud_filter (jsc#SLE-4797).\n- i40e: Remove umem from VSI (jsc#SLE-4797).\n- i40e: Report advertised link modes on 40GBase_LR4, CR4 and fibre (jsc#SLE-4797).\n- i40e: Report advertised link modes on 40GBASE_SR4 (jsc#SLE-4797).\n- i40e: Revert ShadowRAM checksum calculation change (jsc#SLE-4797).\n- i40e: save PTP time before a device reset (jsc#SLE-4797).\n- i40e: Setting VF to VLAN 0 requires restart (jsc#SLE-4797).\n- i40e: ShadowRAM checksum calculation change (jsc#SLE-4797).\n- i40e: The driver now prints the API version in error message (jsc#SLE-4797).\n- i40e: Use struct_size() in kzalloc() (jsc#SLE-4797).\n- i40e: VF\u0027s promiscuous attribute is not kept (jsc#SLE-4797).\n- i40e: Wrong truncation from u16 to u8 (jsc#SLE-4797).\n- i40iw: Avoid panic when handling the inetdev event (jsc#SLE-4793).\n- i40iw: remove support for ib_get_vector_affinity (jsc#SLE-4793).\n- i40iw: remove use of VLAN_TAG_PRESENT (jsc#SLE-4793).\n- ib/hfi1: Add debugfs to control expansion ROM write protect (jsc#SLE-4925).\n- ib/hfi1: Add selected Rcv counters (jsc#SLE-4925).\n- ib/hfi1: Close VNIC sdma_progress sleep window (jsc#SLE-4925).\n- ib/hfi1: Consider LMC in 16B/bypass ingress packet check (jsc#SLE-4925).\n- ib/hfi1: Correctly process FECN and BECN in packets (jsc#SLE-4925).\n- ib/hfi1: Dump pio info for non-user send contexts (jsc#SLE-4925).\n- ib/hfi1: Eliminate opcode tests on mr deref (jsc#SLE-4925).\n- ib/hfi1: Failed to drain send queue when QP is put into error state (jsc#SLE-4925).\n- ib/hfi1: Fix the allocation of RSM table (jsc#SLE-4925).\n- ib/hfi1: Fix two format strings (jsc#SLE-4925).\n- ib/hfi1: Fix WQ_MEM_RECLAIM warning (jsc#SLE-4925).\n- ib/hfi1: Ignore LNI errors before DC8051 transitions to Polling state (jsc#SLE-4925).\n- ib/hfi1: Incorrect sizing of sge for PIO will OOPs (jsc#SLE-4925).\n- ib/hfi1: Limit VNIC use of SDMA engines to the available count (jsc#SLE-4925).\n- ib/hfi1: Reduce lock contention on iowait_lock for sdma and pio (jsc#SLE-4925).\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (jsc#SLE-4925).\n- ib/hfi1: Remove WARN_ON when freeing expected receive groups (jsc#SLE-4925).\n- ib/hfi1: Unreserve a reserved request when it is completed (jsc#SLE-4925).\n- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).\n- ib/rdmavt: Add wc_flags and wc_immdata to cq entry trace (jsc#SLE-4925).\n- ib/rdmavt: Fix frwr memory registration (jsc#SLE-4925).\n- ib/rdmavt: Fix loopback send with invalidate ordering (jsc#SLE-4925).\n- ib/{rdmavt, hfi1): Miscellaneous comment fixes (jsc#SLE-4925).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Enable GRO (bsc#1132227).\n- ibmvnic: Fix completion structure initialization (bsc#1131659).\n- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- ice : Ensure only valid bits are set in ice_aq_set_phy_cfg (jsc#SLE-4803).\n- ice: Add 52 byte RSS hash key support (jsc#SLE-4803).\n- ice: add and use new ice_for_each_traffic_class() macro (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 1/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 2/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 3/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 4/4 (jsc#SLE-4803).\n- ice: Add code for DCB rebuild (jsc#SLE-4803).\n- ice: Add code to control FW LLDP and DCBX (jsc#SLE-4803).\n- ice: Add code to get DCB related statistics (jsc#SLE-4803).\n- ice: Add code to process LLDP Mib change events (jsc#SLE-4803).\n- ice: add const qualifier to mac_addr parameter (jsc#SLE-4803).\n- ice: Add ethtool private flag to make forcing link down optional (jsc#SLE-4803).\n- ice: Add ethtool set_phys_id handler (jsc#SLE-4803).\n- ice: Add function to program ethertype based filter rule on VSIs (jsc#SLE-4803).\n- ice: Add missing case in print_link_msg for printing flow control (jsc#SLE-4803).\n- ice: Add missing PHY type to link settings (jsc#SLE-4803).\n- ice: Add more validation in ice_vc_cfg_irq_map_msg (jsc#SLE-4803).\n- ice: Add priority information into VLAN header (jsc#SLE-4803).\n- ice: Add reg_idx variable in ice_q_vector structure (jsc#SLE-4803).\n- ice: Add support for adaptive interrupt moderation (jsc#SLE-4803).\n- ice: Add support for new PHY types (jsc#SLE-4803).\n- ice: Add support for PF/VF promiscuous mode (jsc#SLE-4803).\n- ice: Allow for software timestamping (jsc#SLE-4803).\n- ice: Always free/allocate q_vectors (jsc#SLE-4803).\n- ice: Audit hotpath structures with pahole (jsc#SLE-4803).\n- ice: avoid multiple unnecessary de-references in probe (jsc#SLE-4803).\n- ice: Bump driver version (jsc#SLE-4803).\n- ice: Bump version (jsc#SLE-4803).\n- ice: Calculate ITR increment based on direct calculation (jsc#SLE-4803).\n- ice: change VF VSI tc info along with num_queues (jsc#SLE-4803).\n- ice: check for a leaf node presence (jsc#SLE-4803).\n- ice: clear VF ARQLEN register on reset (jsc#SLE-4803).\n- ice: code cleanup in ice_sched.c (jsc#SLE-4803).\n- ice: configure GLINT_ITR to always have an ITR gran of 2 (jsc#SLE-4803).\n- ice: Configure RSS LUT and HASH KEY in rebuild path (jsc#SLE-4803).\n- ice: Create a generic name for the ice_rx_flg64_bits structure (jsc#SLE-4803).\n- ice: Create framework for VSI queue context (jsc#SLE-4803).\n- ice: Determine descriptor count and ring size based on PAGE_SIZE (jsc#SLE-4803).\n- ice: Disable sniffing VF traffic on PF (jsc#SLE-4803).\n- ice: Do not bail out when filter already exists (jsc#SLE-4803).\n- ice: Do not let VF know that it is untrusted (jsc#SLE-4803).\n- ice: Do not remove VLAN filters that were never programmed (jsc#SLE-4803).\n- ice: Do not set LB_EN for prune switch rules (jsc#SLE-4803).\n- ice: do not spam VFs with link messages (jsc#SLE-4803).\n- ice: Do not unnecessarily initialize local variable (jsc#SLE-4803).\n- ice: Enable LAN_EN for the right recipes (jsc#SLE-4803).\n- ice: Enable link events over the ARQ (jsc#SLE-4803).\n- ice: Enable MAC anti-spoof by default (jsc#SLE-4803).\n- ice: enable VF admin queue interrupts (jsc#SLE-4803).\n- ice: Fix added in VSI supported nodes calc (jsc#SLE-4803).\n- ice: Fix broadcast traffic in port VLAN mode (jsc#SLE-4803).\n- ice: Fix for adaptive interrupt moderation (jsc#SLE-4803).\n- ice: Fix for allowing too many MDD events on VF (jsc#SLE-4803).\n- ice: Fix for FC get rx/tx pause params (jsc#SLE-4803).\n- ice: fix ice_remove_rule_internal vsi_list handling (jsc#SLE-4803).\n- ice: Fix incorrect use of abbreviations (jsc#SLE-4803).\n- ice: Fix issue reclaiming resources back to the pool after reset (jsc#SLE-4803).\n- ice: Fix issue reconfiguring VF queues (jsc#SLE-4803).\n- ice: Fix issue when adding more than allowed VLANs (jsc#SLE-4803).\n- ice: fix issue where host reboots on unload when iommu=on (jsc#SLE-4803).\n- ice: Fix issue with VF reset and multiple VFs support on PFs (jsc#SLE-4803).\n- ice: fix numeric overflow warning (jsc#SLE-4803).\n- ice: fix some function prototype and signature style issues (jsc#SLE-4803).\n- ice: fix stack hogs from struct ice_vsi_ctx structures (jsc#SLE-4803).\n- ice: fix static analysis warnings (jsc#SLE-4803).\n- ice: Fix the calculation of ICE_MAX_MTU (jsc#SLE-4803).\n- ice: fix the divide by zero issue (jsc#SLE-4803).\n- ice: Fix typos in code comments (jsc#SLE-4803).\n- ice: flush Tx pipe on disable queue timeout (jsc#SLE-4803).\n- ice: Gather the rx buf clean-up logic for better reuse (jsc#SLE-4803).\n- ice: Get resources per function (jsc#SLE-4803).\n- ice: Get rid of ice_pull_tail (jsc#SLE-4803).\n- ice: Get VF VSI instances directly via PF (jsc#SLE-4803).\n- ice: Implement flow to reset VFs with PFR and other resets (jsc#SLE-4803).\n- ice: Implement getting and setting ethtool coalesce (jsc#SLE-4803).\n- ice: Implement pci_error_handler ops (jsc#SLE-4803).\n- ice: Implement support for normal get_eeprom[_len] ethtool ops (jsc#SLE-4803).\n- ice: Limit the ice_add_rx_frag to frag addition (jsc#SLE-4803).\n- ice: map Rx buffer pages with DMA attributes (jsc#SLE-4803).\n- ice: Move aggregator list into ice_hw instance (jsc#SLE-4803).\n- ice: Offload SCTP checksum (jsc#SLE-4803).\n- ice: only use the VF for ICE_VSI_VF in ice_vsi_release (jsc#SLE-4803).\n- ice: Preserve VLAN Rx stripping settings (jsc#SLE-4803).\n- ice: Prevent unintended multiple chain resets (jsc#SLE-4803).\n- ice: Pull out page reuse checks onto separate function (jsc#SLE-4803).\n- ice: Put __ICE_PREPARED_FOR_RESET check in ice_prepare_for_reset (jsc#SLE-4803).\n- ice: Reduce scope of variable in ice_vsi_cfg_rxqs (jsc#SLE-4803).\n- ice: Refactor a few Tx scheduler functions (jsc#SLE-4803).\n- ice: Refactor getting/setting coalesce (jsc#SLE-4803).\n- ice: Refactor link event flow (jsc#SLE-4803).\n- ice: Remove \u00272 BITS\u0027 comment (jsc#SLE-4803).\n- ice: Remove __always_unused attribute (jsc#SLE-4803).\n- ice: remove redundant variable and if condition (jsc#SLE-4803).\n- ice: Remove runtime change of PFINT_OICR_ENA register (jsc#SLE-4803).\n- ice: Remove unnecessary braces (jsc#SLE-4803).\n- ice: Remove unnecessary newlines from log messages (jsc#SLE-4803).\n- ice: Remove unnecessary wait when disabling/enabling Rx queues (jsc#SLE-4803).\n- ice: Remove unused function prototype (jsc#SLE-4803).\n- ice: Remove unused function prototype (jsc#SLE-4803).\n- ice: Remove unused vsi_id field (jsc#SLE-4803).\n- ice: Reset all VFs with VFLR during SR-IOV init flow (jsc#SLE-4803).\n- ice: Resolve static analysis reported issue (jsc#SLE-4803).\n- ice: Restore VLAN switch rule if port VLAN existed before (jsc#SLE-4803).\n- ice: Retrieve rx_buf in separate function (jsc#SLE-4803).\n- ice: Return configuration error without queue to disable (jsc#SLE-4803).\n- ice: Rework queue management code for reuse (jsc#SLE-4803).\n- ice: Separate if conditions for ice_set_features() (jsc#SLE-4803).\n- ice: Set LAN_EN for all directional rules (jsc#SLE-4803).\n- ice: Set physical link up/down when an interface is set up/down (jsc#SLE-4803).\n- ice: sizeof(type\u003e) should be avoided (jsc#SLE-4803).\n- ice: Suppress false-positive style issues reported by static analyzer (jsc#SLE-4803).\n- ice: use absolute vector ID for VFs (jsc#SLE-4803).\n- ice: Use bitfields where possible (jsc#SLE-4803).\n- ice: Use dev_err when ice_cfg_vsi_lan fails (jsc#SLE-4803).\n- ice: Use ice_for_each_q_vector macro where possible (jsc#SLE-4803).\n- ice: use ice_for_each_vsi macro when possible (jsc#SLE-4803).\n- ice: use irq_num var in ice_vsi_req_irq_msix (jsc#SLE-4803).\n- ice: Use more efficient structures (jsc#SLE-4803).\n- ice: Use pf instead of vsi-back (jsc#SLE-4803).\n- ice: use virt channel status codes (jsc#SLE-4803).\n- ice: Validate ring existence and its q_vector per VSI (jsc#SLE-4803).\n- igb: Bump version number (jsc#SLE-4798).\n- igb: Exclude device from suspend direct complete optimization (jsc#SLE-4798).\n- igb: fix various indentation issues (jsc#SLE-4798).\n- igb: Fix WARN_ONCE on runtime suspend (jsc#SLE-4798).\n- igb: use struct_size() helper (jsc#SLE-4798).\n- igc: Add ethtool support (jsc#SLE-4799).\n- igc: Add multiple receive queues control supporting (jsc#SLE-4799).\n- igc: Add support for statistics (jsc#SLE-4799).\n- igc: Add support for the ntuple feature (jsc#SLE-4799).\n- igc: Extend the ethtool supporting (jsc#SLE-4799).\n- igc: Fix code redundancy (jsc#SLE-4799).\n- igc: Fix the typo in igc_base.h header definition (jsc#SLE-4799).\n- igc: Remove the \u0027igc_get_phy_id_base\u0027 method (jsc#SLE-4799).\n- igc: Remove the \u0027igc_read_mac_addr_base\u0027 method (jsc#SLE-4799).\n- igc: Remove unneeded code (jsc#SLE-4799).\n- igc: Remove unneeded hw_dbg prints (jsc#SLE-4799).\n- igc: Remove unreachable code from igc_phy.c file (jsc#SLE-4799).\n- igc: Remove unused code (jsc#SLE-4799).\n- igc: Use struct_size() helper (jsc#SLE-4799).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).\n- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).\n- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: core: fix a possible circular locking dependency (bsc#1051510).\n- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).\n- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).\n- iio: Fix scan mask selection (bsc#1051510).\n- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).\n- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).\n- infiniband: hfi1: drop crazy DEBUGFS_SEQ_FILE_CREATE() macro (jsc#SLE-4925).\n- infiniband: hfi1: no need to check return value of debugfs_create functions (jsc#SLE-4925).\n- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- input: introduce KEY_ASSISTANT (bsc#1051510).\n- input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).\n- input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).\n- intel: correct return from set features callback (jsc#SLE-4795).\n- intel_idle: add support for Jacobsville (jsc#SLE-5394).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).\n- iommu/amd: Set exclusion range correctly (bsc#1130425).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user-\u003erelease_barrier (bsc#1111666).\n- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: Return error for RTA_VIA attribute (networking-stable-19_03_07).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6: Fix dangling pointer when ipv6 fragment (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipv6: propagate genlmsg_reply return code (networking-stable-19_02_24).\n- ipv6: Return error for RTA_VIA attribute (networking-stable-19_03_07).\n- ipv6: sit: reset ip header pointer in ipip6_rcv (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: disallow userns cap_net_admin to change global mode/flags (networking-stable-19_03_15).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix stats update from local clients (git-fixes).\n- ipvs: remove IPS_NAT_MASK check to fix passive FTP (git-fixes).\n- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).\n- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).\n- iwlwifi: fix driver operation for 5350 (bsc#1111666).\n- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).\n- ixgbe: fix mdio bus registration (jsc#SLE-4795).\n- ixgbe: fix older devices that do not support IXGBE_MRQC_L3L4TXSWEN (jsc#SLE-4795).\n- ixgbe: register a mdiobus (jsc#SLE-4795).\n- ixgbe: remove magic constant in ixgbe_reset_hw_82599() (jsc#SLE-4795).\n- ixgbe: use mii_bus to handle MII related ioctls (jsc#SLE-4795).\n- ixgbe: Use struct_size() helper (jsc#SLE-4795).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kabi i40e ignore include (jsc#SLE-4797).\n- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).\n- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kabi/severities: exclude hns3 symbols (bsc#1134948)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi/severities: missed hns roce module\n- kabi: arm64: cpuhotplug: Reuse other arch\u0027s cpuhp_state ().\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI: protect dma-mapping.h include (kabi).\n- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).\n- kABI: protect ip_options_rcv_srr (kabi).\n- kABI: protect struct mlx5_td (kabi).\n- kABI: protect struct pci_dev (kabi).\n- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).\n- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).\n- kABI: restore icmp_send (kabi).\n- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).\n- kcm: switch order of device registration to fix a crash (bnc#1130527).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- kernfs: do not set dentry-\u003ed_fsdata (boo#1133115).\n- keys: always initialize keyring_index_key::desc_len (bsc#1051510).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- keys: user: Align the payload buffer (bsc#1051510).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).\n- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: nVMX: Sign extend displacements of VMX instr\u0027s mem operands (bsc#1132562).\n- kvm: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).\n- kvm: VMX: Compare only a single byte for VMCS\u0027 \u0027launched\u0027 in vCPU-run (bsc#1132555).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).\n- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).\n- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).\n- lightnvm: if LUNs are already allocated fix return (bsc#1085535).\n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mac80211: do not attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md/raid1: do not clear bitmap bits on interrupted recovery (git-fixes).\n- md/raid5: fix \u0027out of memory\u0027 during raid cache recovery (git-fixes).\n- md: batch flush requests (bsc#1119680).\n- md: Fix failed allocation of md_register_thread (git-fixes).\n- md: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).\n- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev-\u003ebitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- missing barriers in some of unix_sock -\u003eaddr and -\u003epath accesses (networking-stable-19_03_15).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mm/debug.c: fix __dump_page when mapping-\u003ehost is not set (bsc#1131934).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).\n- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).\n- mm: create non-atomic version of SetPageReserved for init use (jsc#SLE-6647).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: bcm2835 MMC issues (bsc#1070872).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mmc: core: Fix tag set memory leak (bsc#1111666).\n- mmc: davinci: remove extraneous __init annotation (bsc#1051510).\n- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).\n- mmc: sdhci: Handle auto-command errors (bsc#1051510).\n- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).\n- mmc: tmio_mmc_core: do not claim spurious interrupts (bsc#1051510).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mpls: Return error for RTA_GATEWAY attribute (networking-stable-19_03_07).\n- mt7601u: bump supported EEPROM version (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd-\u003ename (bsc#1051510).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: do not advertise ibSS features without FW support (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).\n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net/hsr: fix possible crash in add_timer() (networking-stable-19_03_15).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: Do not overwrite pedit action when multiple pedit used (networking-stable-19_02_24).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoib, Reset QP after channels are closed (bsc#1075020).\n- net/packet: fix 4gb buffer limit due to overflow check (networking-stable-19_02_24).\n- net/packet: Set __GFP_NOWARN upon allocation in alloc_pg_vec (git-fixes).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).\n- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: rework pnet table (bsc#1129845 LTC#176252).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).\n- net/x25: fix a race in x25_bind() (networking-stable-19_03_15).\n- net/x25: fix use-after-free in x25_device_event() (networking-stable-19_03_15).\n- net/x25: reset state in x25_connect() (networking-stable-19_03_15).\n- net: Add __icmp_send helper (networking-stable-19_03_07).\n- net: Add header for usage of fls64() (networking-stable-19_02_20).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: avoid false positives in untrusted gso validation (git-fixes).\n- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).\n- net: avoid use IPCB in cipso_v4_error (networking-stable-19_03_07).\n- net: bridge: add vlan_tunnel to bridge port policies (git-fixes).\n- net: bridge: fix per-port af_packet sockets (git-fixes).\n- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (git-fixes).\n- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).\n- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).\n- net: datagram: fix unbounded loop in __skb_try_recv_datagram() (git-fixes).\n- net: Do not allocate page fragments that are not skb aligned (networking-stable-19_02_20).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: legacy: do not unmask port bitmaps (git-fixes).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: dsa: mv88e6xxx: Fix u64 statistics (networking-stable-19_03_07).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: Fix for_each_netdev_feature on Big endian (networking-stable-19_02_20).\n- net: fix IPv6 prefix route residue (networking-stable-19_02_20).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: Fix untag for vlan packets without ethernet header (git-fixes).\n- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).\n- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).\n- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).\n- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).\n- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).\n- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: add protect when handling mac addr list (bsc#1104353 ).\n- net: hns3: add queue\u0027s statistics update to service task (bsc#1104353 bsc#1134981).\n- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).\n- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).\n- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).\n- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).\n- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).\n- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).\n- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).\n- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).\n- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).\n- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).\n- net: hns3: code optimization for command queue\u0027 spin lock (bsc#1104353 bsc#1135042).\n- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).\n- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).\n- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).\n- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).\n- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).\n- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).\n- net: hns3: extend the loopback state acquisition time (bsc#1104353).\n- net: hns3: fix data race between ring-\u003enext_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix error handling for desc filling (bsc#1104353 ).\n- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).\n- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).\n- net: hns3: fix for TX clean num when cleaning TX BD (bsc#1104353 ).\n- net: hns3: fix for vport-\u003ebw_limit overflow problem (bsc#1104353 bsc#1134998).\n- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).\n- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).\n- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).\n- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).\n- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).\n- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).\n- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).\n- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).\n- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).\n- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).\n- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).\n- net: hns3: minor optimization for datapath (bsc#1104353 ).\n- net: hns3: minor optimization for ring_space (bsc#1104353 ).\n- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).\n- net: hns3: modify HNS3_NIC_STATE_INITED flag in hns3_reset_notify_uninit_enet (bsc#1104353).\n- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).\n- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).\n- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).\n- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).\n- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).\n- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).\n- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).\n- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).\n- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).\n- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).\n- net: hns3: remove redundant assignment of l2_hdr to itself (bsc#1104353).\n- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).\n- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).\n- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).\n- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).\n- net: hns3: simplify hclgevf_cmd_csq_clean (bsc#1104353 ).\n- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).\n- net: hns3: split function hnae3_match_n_instantiate() (bsc#1104353).\n- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).\n- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).\n- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).\n- net: hns3: use a reserved byte to identify need_resp flag (bsc#1104353).\n- net: hns3: use atomic_t replace u32 for arq\u0027s count (bsc#1104353 bsc#1134953).\n- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).\n- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).\n- net: hsr: fix memory leak in hsr_dev_finalize() (networking-stable-19_03_15).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails (networking-stable-19_03_07).\n- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).\n- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).\n- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables \u003e 255 (networking-stable-19_03_15).\n- net: sit: fix memory leak in sit_init_net() (networking-stable-19_03_07).\n- net: sit: fix UBSAN Undefined behaviour in check_6rd (networking-stable-19_03_15).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: socket: set sock-\u003esk to NULL after calling proto_ops::release() (networking-stable-19_03_07).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- net: validate untrusted gso packets without csum offload (networking-stable-19_02_20).\n- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (git-fixes).\n- net_sched: fix two more memory leaks in cls_tcindex (networking-stable-19_02_24).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).\n- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).\n- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (git-fixes).\n- netfilter: drop template ct when conntrack is skipped (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ip6t_MASQUERADE: add dependency on conntrack module (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: ipset: Missing nfnl_lock()/nfnl_unlock() is added to ip_set_net_exit() (git-fixes).\n- netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target} (git-fixes).\n- netfilter: x_tables: fix int overflow in xt_alloc_table_info() (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- netlabel: fix out-of-bounds memory accesses (networking-stable-19_03_07).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- nfc: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).\n- nfs/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).\n- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).\n- nfs: add module option to limit NFSv4 minor version (jsc#PM-231).\n- nfs: Do not recoalesce on error in nfs_pageio_complete_mirror() (git-fixes).\n- nfs: Do not use page_file_mapping after removing the page (git-fixes).\n- nfs: Fix a soft lockup in the delegation recovery code (git-fixes).\n- nfs: Fix a typo in nfs_init_timeout_values() (git-fixes).\n- nfs: Fix an I/O request leakage in nfs_do_recoalesce (git-fixes).\n- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).\n- nfs: Fix I/O request leakages (git-fixes).\n- nfs: fix mount/umount race in nlmclnt (git-fixes).\n- nfsd4: catch some false session retries (git-fixes).\n- nfsd4: fix cached replies to solo SEQUENCE compounds (git-fixes).\n- nfsv4.1 do not free interrupted slot on open (git-fixes).\n- nfsv4.1: Reinitialise sequence results before retransmitting a request (git-fixes).\n- nfsv4/flexfiles: Fix invalid deref in FF_LAYOUT_DEVID_NODE() (git-fixes).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme-fc: use separate work queue to avoid warning (bsc#1131673).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: add proper discard setup for the multipath device (bsc#1114638).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: fix the dangerous reference of namespaces list (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvme: make sure ns head inherits underlying device limits (bsc#1131673).\n- nvme: only reconfigure discard if necessary (bsc#1114638).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packet: validate msg_namelen in send directly (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- pci: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).\n- pci: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).\n- pci: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- pci: Factor out pcie_retrain_link() function (git-fixes).\n- pci: Init pcie feature bits for managed host bridge alloc (bsc#1111666).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- pci: pciehp: Convert to threaded IRQ (bsc#1133005).\n- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).\n- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).\n- pci: Work around Pericom pcie-to-pci bridge Retrain Link erratum (git-fixes).\n- perf tools: Add Hygon Dhyana support ().\n- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).\n- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- phy: sun4i-usb: Support set_mode to usb_HOST for non-OTG PHYs (bsc#1051510).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific\n- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E\n- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).\n- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).\n- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, git-fixes).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, git-fixes).\n- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).\n- powerpc/mm: Check secondary hash page table (bsc#1065729).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).\n- powerpc/numa: improve control of topology updates (bsc#1133584).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).\n- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).\n- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).\n- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).\n- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).\n- powerpc/powernv: Do not reprogram SLW image on every kvm guest entry/exit (bsc#1061840).\n- powerpc/powernv: Make opal log only readable by root (bsc#1065729).\n- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).\n- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).\n- powerpc: Fix 32-bit kvm-PR lockup and host crash with MacOS guest (bsc#1061840).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- proc/kcore: do not bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 -\u003e \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 -\u003e \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).\n- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).\n- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027cur_rings, max_hw_rings, tx_desc_info\u0027 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027op, cmd_op\u0027 (bsc#1136469 jsc#SLE-4695).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- qmi_wwan: Add support for Quectel EG12/EM12 (networking-stable-19_03_07).\n- ras/cec: Check the correct variable in the debugfs error handling (bsc#1085535).\n- ravb: Decrease TxFIFO depth of Q3 and Q2 to one (networking-stable-19_03_15).\n- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).\n- rdma/cxgb4: Add support for kernel mode SRQ\u0027s (bsc#1127371).\n- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).\n- rdma/cxgb4: Don\u0027t expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: fix some info leaks (bsc#1127371).\n- rdma/cxgb4: Fix spelling mistake \u0027immedate\u0027 -\u003e \u0027immediate\u0027 (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).\n- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).\n- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).\n- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).\n- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).\n- rdma/hns: Delete unused variable in hns_roce_v2_modify_qp function (bsc#1104427).\n- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).\n- rdma/hns: Fix bad endianess of port_pd variable (bsc#1104427 ).\n- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).\n- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).\n- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).\n- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).\n- rdma/hns: Limit scope of hns_roce_cmq_send() (bsc#1104427 ).\n- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).\n- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).\n- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).\n- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).\n- rdma/hns: Only assgin some fields if the relatived attr_mask is set (bsc#1104427).\n- rdma/hns: Only assign the fields of the rq psn if ib_QP_RQ_PSN is set (bsc#1104427).\n- rdma/hns: Only assign the relatived fields of psn if ib_QP_SQ_PSN is set (bsc#1104427).\n- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove set but not used variable \u0027rst\u0027 (bsc#1104427 bsc#1126206).\n- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).\n- rdma/hns: Support to create 1M srq queue (bsc#1104427 ).\n- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).\n- rdma/hns: Update the range of raq_psn field of qp context (bsc#1104427).\n- rdma/i40iw: Handle workqueue allocation failure (jsc#SLE-4793).\n- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).\n- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).\n- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).\n- rdma/qedr: Fix incorrect device rate (bsc#1136188).\n- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).\n- rdma/rdmavt: Use correct sizing on buffers holding page DMA addresses (jsc#SLE-4925).\n- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).\n- rds: fix refcount bug in rds_sock_addref (git-fixes).\n- rds: tcp: atomically purge entries from rds_tcp_conn_list during netns delete (git-fixes).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- ring-buffer: Check if memory is available before allocation (bsc#1132531).\n- route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race (networking-stable-19_03_15).\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- rxrpc: Do not release call mutex on error pointer (git-fixes).\n- rxrpc: Do not treat call aborts as conn aborts (git-fixes).\n- rxrpc: Fix client call queueing, waiting for channel (networking-stable-19_03_15).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- rxrpc: Fix Tx ring annotation after initial Tx failure (git-fixes).\n- s390/dasd: fix panic for failed online processing (bsc#1132589).\n- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- scripts/git_sort/git_sort.py: remove old SCSI git branches\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi: hisi: KABI ignore new symbols (bsc#1135038).\n- scsi: hisi_sas: add host reset interface for test (bsc#1135041).\n- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).\n- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).\n- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).\n- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).\n- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).\n- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).\n- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).\n- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).\n- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).\n- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).\n- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).\n- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).\n- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).\n- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).\n- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).\n- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).\n- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).\n- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).\n- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).\n- scsi: qla2xxx: avoid printf format warning (bsc#1136215).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove FW default template (bsc#1136215).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: smartpqi: add H3C controller IDs (bsc#1133547).\n- scsi: smartpqi: add h3c ssid (bsc#1133547).\n- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).\n- scsi: smartpqi: add ofa support (bsc#1133547).\n- scsi: smartpqi: Add retries for device reset (bsc#1133547).\n- scsi: smartpqi: add smp_utils support (bsc#1133547).\n- scsi: smartpqi: add spdx (bsc#1133547).\n- scsi: smartpqi: add support for huawei controllers (bsc#1133547).\n- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).\n- scsi: smartpqi: add sysfs attributes (bsc#1133547).\n- scsi: smartpqi: allow for larger raid maps (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).\n- scsi: smartpqi: check for null device pointers (bsc#1133547).\n- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).\n- scsi: smartpqi: correct lun reset issues (bsc#1133547).\n- scsi: smartpqi: correct volume status (bsc#1133547).\n- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).\n- scsi: smartpqi: enhance numa node detection (bsc#1133547).\n- scsi: smartpqi: fix build warnings (bsc#1133547).\n- scsi: smartpqi: fix disk name mount point (bsc#1133547).\n- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).\n- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).\n- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).\n- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).\n- scsi: smartpqi: Reporting \u0027logical unit failure\u0027 (bsc#1133547).\n- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).\n- scsi: smartpqi: update copyright (bsc#1133547).\n- scsi: smartpqi: update driver version (bsc#1133547).\n- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).\n- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).\n- scsi: zfcp: make DIX experimental, disabled, and independent of DIF (jsc#SLE-6772).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: call gso_reset_checksum when computing checksum in sctp_gso_segment (networking-stable-19_02_24).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- sit: check if IPv6 enabled before calling ip6_err_gen_icmpv6_unreach() (networking-stable-19_02_24).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- soc: imx-sgtl5000: add missing put_device() (bsc#1051510).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).\n- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix possible double-free of -\u003eusb_rx_buf (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).\n- staging: comedi: vmk80xx: Fix possible double-free of -\u003eusb_rx_buf (bsc#1051510).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).\n- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).\n- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).\n- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).\n- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510).\n- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- sunrpc: fix 4 more call sites that were using stack memory with a scatterlist (git-fixes).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).\n- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).\n- svm: Fix AVIC DFR and LDR handling (bsc#1132558).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- sysctl: handle overflow for file-max (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: fix TCP_REPAIR_QUEUE bound checking (git-fixes).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- tcp: tcp_v4_err() should be more careful (networking-stable-19_02_20).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- testing: nvdimm: provide SZ_4G constant (bsc#1132982).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: fix race condition causing hung sendto (networking-stable-19_03_07).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools/cpupower: Add Hygon Dhyana support ().\n- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).\n- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).\n- tracing: Fix buffer_ref pipe ops (bsc#1133698).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: serial_core, add -\u003einstall (bnc#1129693).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: fix blocking read (networking-stable-19_03_07).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- tun: remove unnecessary memory barrier (networking-stable-19_03_07).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: cdc-acm: fix unthrottle races (bsc#1051510).\n- usb: chipidea: Grab the (legacy) usb PHY by phandle first (bsc#1051510).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).\n- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- usb: serial: fix unthrottle races (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- usb: yurex: Fix protection fault after device removal (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- vxlan: test dev-\u003eflags and IFF_UP before calling netif_rx() (networking-stable-19_02_20).\n- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).\n- x86/kvm: Add Hygon Dhyana support to kvm ().\n- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).\n- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).\n- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).\n- x86/mce: Handle varying MCA bank counts (bsc#1128415).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to pci and northbridge ().\n- x86/pci: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318).\n- x86/perf/amd: Remove need to check \u0027running\u0027 bit in NMI handler (bsc#1131438).\n- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).\n- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xen-netback: do not populate the hash cache on XenBus disconnect (networking-stable-19_03_07).\n- xen-netback: fix occasional leak of grant ref mappings under memory pressure (networking-stable-19_03_07).\n- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: do not call rcu_read_unlock when afinfo is NULL in xfrm_get_tos (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: Fix ESN sequence number handling for IPsec GSO packets (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix rcu_read_unlock usage in xfrm_local_error (git-fixes).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm: Return error on unknown encap_type in init_state (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: hold xfs_buf locked between shortform-\u003eleaf conversion and the addition of an attribute (bsc#1133675).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: refactor xfs_trans_roll (bsc#1133667).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xsk: export xdp_get_umem_from_qid (jsc#SLE-4797).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1550,SUSE-SLE-Module-Basesystem-15-SP1-2019-1550,SUSE-SLE-Module-Development-Tools-15-SP1-2019-1550,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1550,SUSE-SLE-Module-Legacy-15-SP1-2019-1550,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1550,SUSE-SLE-Product-HA-15-SP1-2019-1550,SUSE-SLE-Product-WE-15-SP1-2019-1550",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1550-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1550-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1550-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1050549",
"url": "https://bugzilla.suse.com/1050549"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1052904",
"url": "https://bugzilla.suse.com/1052904"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1055121",
"url": "https://bugzilla.suse.com/1055121"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1070872",
"url": "https://bugzilla.suse.com/1070872"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1085536",
"url": "https://bugzilla.suse.com/1085536"
},
{
"category": "self",
"summary": "SUSE Bug 1086657",
"url": "https://bugzilla.suse.com/1086657"
},
{
"category": "self",
"summary": "SUSE Bug 1088804",
"url": "https://bugzilla.suse.com/1088804"
},
{
"category": "self",
"summary": "SUSE Bug 1093389",
"url": "https://bugzilla.suse.com/1093389"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103186",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "self",
"summary": "SUSE Bug 1103259",
"url": "https://bugzilla.suse.com/1103259"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108193",
"url": "https://bugzilla.suse.com/1108193"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1108937",
"url": "https://bugzilla.suse.com/1108937"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111331",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1112128",
"url": "https://bugzilla.suse.com/1112128"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1114542",
"url": "https://bugzilla.suse.com/1114542"
},
{
"category": "self",
"summary": "SUSE Bug 1114638",
"url": "https://bugzilla.suse.com/1114638"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117114",
"url": "https://bugzilla.suse.com/1117114"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119680",
"url": "https://bugzilla.suse.com/1119680"
},
{
"category": "self",
"summary": "SUSE Bug 1119843",
"url": "https://bugzilla.suse.com/1119843"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120318",
"url": "https://bugzilla.suse.com/1120318"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122767",
"url": "https://bugzilla.suse.com/1122767"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1126206",
"url": "https://bugzilla.suse.com/1126206"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1126704",
"url": "https://bugzilla.suse.com/1126704"
},
{
"category": "self",
"summary": "SUSE Bug 1127175",
"url": "https://bugzilla.suse.com/1127175"
},
{
"category": "self",
"summary": "SUSE Bug 1127371",
"url": "https://bugzilla.suse.com/1127371"
},
{
"category": "self",
"summary": "SUSE Bug 1127374",
"url": "https://bugzilla.suse.com/1127374"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128415",
"url": "https://bugzilla.suse.com/1128415"
},
{
"category": "self",
"summary": "SUSE Bug 1128544",
"url": "https://bugzilla.suse.com/1128544"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128971",
"url": "https://bugzilla.suse.com/1128971"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129273",
"url": "https://bugzilla.suse.com/1129273"
},
{
"category": "self",
"summary": "SUSE Bug 1129497",
"url": "https://bugzilla.suse.com/1129497"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1129845",
"url": "https://bugzilla.suse.com/1129845"
},
{
"category": "self",
"summary": "SUSE Bug 1130195",
"url": "https://bugzilla.suse.com/1130195"
},
{
"category": "self",
"summary": "SUSE Bug 1130425",
"url": "https://bugzilla.suse.com/1130425"
},
{
"category": "self",
"summary": "SUSE Bug 1130527",
"url": "https://bugzilla.suse.com/1130527"
},
{
"category": "self",
"summary": "SUSE Bug 1130567",
"url": "https://bugzilla.suse.com/1130567"
},
{
"category": "self",
"summary": "SUSE Bug 1130579",
"url": "https://bugzilla.suse.com/1130579"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1130937",
"url": "https://bugzilla.suse.com/1130937"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131326",
"url": "https://bugzilla.suse.com/1131326"
},
{
"category": "self",
"summary": "SUSE Bug 1131427",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "self",
"summary": "SUSE Bug 1131438",
"url": "https://bugzilla.suse.com/1131438"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131467",
"url": "https://bugzilla.suse.com/1131467"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131530",
"url": "https://bugzilla.suse.com/1131530"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131574",
"url": "https://bugzilla.suse.com/1131574"
},
{
"category": "self",
"summary": "SUSE Bug 1131587",
"url": "https://bugzilla.suse.com/1131587"
},
{
"category": "self",
"summary": "SUSE Bug 1131659",
"url": "https://bugzilla.suse.com/1131659"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1131847",
"url": "https://bugzilla.suse.com/1131847"
},
{
"category": "self",
"summary": "SUSE Bug 1131848",
"url": "https://bugzilla.suse.com/1131848"
},
{
"category": "self",
"summary": "SUSE Bug 1131851",
"url": "https://bugzilla.suse.com/1131851"
},
{
"category": "self",
"summary": "SUSE Bug 1131900",
"url": "https://bugzilla.suse.com/1131900"
},
{
"category": "self",
"summary": "SUSE Bug 1131934",
"url": "https://bugzilla.suse.com/1131934"
},
{
"category": "self",
"summary": "SUSE Bug 1131935",
"url": "https://bugzilla.suse.com/1131935"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1132219",
"url": "https://bugzilla.suse.com/1132219"
},
{
"category": "self",
"summary": "SUSE Bug 1132226",
"url": "https://bugzilla.suse.com/1132226"
},
{
"category": "self",
"summary": "SUSE Bug 1132227",
"url": "https://bugzilla.suse.com/1132227"
},
{
"category": "self",
"summary": "SUSE Bug 1132365",
"url": "https://bugzilla.suse.com/1132365"
},
{
"category": "self",
"summary": "SUSE Bug 1132368",
"url": "https://bugzilla.suse.com/1132368"
},
{
"category": "self",
"summary": "SUSE Bug 1132369",
"url": "https://bugzilla.suse.com/1132369"
},
{
"category": "self",
"summary": "SUSE Bug 1132370",
"url": "https://bugzilla.suse.com/1132370"
},
{
"category": "self",
"summary": "SUSE Bug 1132372",
"url": "https://bugzilla.suse.com/1132372"
},
{
"category": "self",
"summary": "SUSE Bug 1132373",
"url": "https://bugzilla.suse.com/1132373"
},
{
"category": "self",
"summary": "SUSE Bug 1132384",
"url": "https://bugzilla.suse.com/1132384"
},
{
"category": "self",
"summary": "SUSE Bug 1132397",
"url": "https://bugzilla.suse.com/1132397"
},
{
"category": "self",
"summary": "SUSE Bug 1132402",
"url": "https://bugzilla.suse.com/1132402"
},
{
"category": "self",
"summary": "SUSE Bug 1132403",
"url": "https://bugzilla.suse.com/1132403"
},
{
"category": "self",
"summary": "SUSE Bug 1132404",
"url": "https://bugzilla.suse.com/1132404"
},
{
"category": "self",
"summary": "SUSE Bug 1132405",
"url": "https://bugzilla.suse.com/1132405"
},
{
"category": "self",
"summary": "SUSE Bug 1132407",
"url": "https://bugzilla.suse.com/1132407"
},
{
"category": "self",
"summary": "SUSE Bug 1132411",
"url": "https://bugzilla.suse.com/1132411"
},
{
"category": "self",
"summary": "SUSE Bug 1132412",
"url": "https://bugzilla.suse.com/1132412"
},
{
"category": "self",
"summary": "SUSE Bug 1132413",
"url": "https://bugzilla.suse.com/1132413"
},
{
"category": "self",
"summary": "SUSE Bug 1132414",
"url": "https://bugzilla.suse.com/1132414"
},
{
"category": "self",
"summary": "SUSE Bug 1132426",
"url": "https://bugzilla.suse.com/1132426"
},
{
"category": "self",
"summary": "SUSE Bug 1132527",
"url": "https://bugzilla.suse.com/1132527"
},
{
"category": "self",
"summary": "SUSE Bug 1132531",
"url": "https://bugzilla.suse.com/1132531"
},
{
"category": "self",
"summary": "SUSE Bug 1132555",
"url": "https://bugzilla.suse.com/1132555"
},
{
"category": "self",
"summary": "SUSE Bug 1132558",
"url": "https://bugzilla.suse.com/1132558"
},
{
"category": "self",
"summary": "SUSE Bug 1132561",
"url": "https://bugzilla.suse.com/1132561"
},
{
"category": "self",
"summary": "SUSE Bug 1132562",
"url": "https://bugzilla.suse.com/1132562"
},
{
"category": "self",
"summary": "SUSE Bug 1132563",
"url": "https://bugzilla.suse.com/1132563"
},
{
"category": "self",
"summary": "SUSE Bug 1132564",
"url": "https://bugzilla.suse.com/1132564"
},
{
"category": "self",
"summary": "SUSE Bug 1132570",
"url": "https://bugzilla.suse.com/1132570"
},
{
"category": "self",
"summary": "SUSE Bug 1132571",
"url": "https://bugzilla.suse.com/1132571"
},
{
"category": "self",
"summary": "SUSE Bug 1132572",
"url": "https://bugzilla.suse.com/1132572"
},
{
"category": "self",
"summary": "SUSE Bug 1132589",
"url": "https://bugzilla.suse.com/1132589"
},
{
"category": "self",
"summary": "SUSE Bug 1132618",
"url": "https://bugzilla.suse.com/1132618"
},
{
"category": "self",
"summary": "SUSE Bug 1132673",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "self",
"summary": "SUSE Bug 1132681",
"url": "https://bugzilla.suse.com/1132681"
},
{
"category": "self",
"summary": "SUSE Bug 1132726",
"url": "https://bugzilla.suse.com/1132726"
},
{
"category": "self",
"summary": "SUSE Bug 1132828",
"url": "https://bugzilla.suse.com/1132828"
},
{
"category": "self",
"summary": "SUSE Bug 1132894",
"url": "https://bugzilla.suse.com/1132894"
},
{
"category": "self",
"summary": "SUSE Bug 1132943",
"url": "https://bugzilla.suse.com/1132943"
},
{
"category": "self",
"summary": "SUSE Bug 1132982",
"url": "https://bugzilla.suse.com/1132982"
},
{
"category": "self",
"summary": "SUSE Bug 1133005",
"url": "https://bugzilla.suse.com/1133005"
},
{
"category": "self",
"summary": "SUSE Bug 1133016",
"url": "https://bugzilla.suse.com/1133016"
},
{
"category": "self",
"summary": "SUSE Bug 1133094",
"url": "https://bugzilla.suse.com/1133094"
},
{
"category": "self",
"summary": "SUSE Bug 1133095",
"url": "https://bugzilla.suse.com/1133095"
},
{
"category": "self",
"summary": "SUSE Bug 1133115",
"url": "https://bugzilla.suse.com/1133115"
},
{
"category": "self",
"summary": "SUSE Bug 1133149",
"url": "https://bugzilla.suse.com/1133149"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133486",
"url": "https://bugzilla.suse.com/1133486"
},
{
"category": "self",
"summary": "SUSE Bug 1133529",
"url": "https://bugzilla.suse.com/1133529"
},
{
"category": "self",
"summary": "SUSE Bug 1133547",
"url": "https://bugzilla.suse.com/1133547"
},
{
"category": "self",
"summary": "SUSE Bug 1133584",
"url": "https://bugzilla.suse.com/1133584"
},
{
"category": "self",
"summary": "SUSE Bug 1133593",
"url": "https://bugzilla.suse.com/1133593"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1133667",
"url": "https://bugzilla.suse.com/1133667"
},
{
"category": "self",
"summary": "SUSE Bug 1133668",
"url": "https://bugzilla.suse.com/1133668"
},
{
"category": "self",
"summary": "SUSE Bug 1133672",
"url": "https://bugzilla.suse.com/1133672"
},
{
"category": "self",
"summary": "SUSE Bug 1133674",
"url": "https://bugzilla.suse.com/1133674"
},
{
"category": "self",
"summary": "SUSE Bug 1133675",
"url": "https://bugzilla.suse.com/1133675"
},
{
"category": "self",
"summary": "SUSE Bug 1133698",
"url": "https://bugzilla.suse.com/1133698"
},
{
"category": "self",
"summary": "SUSE Bug 1133702",
"url": "https://bugzilla.suse.com/1133702"
},
{
"category": "self",
"summary": "SUSE Bug 1133731",
"url": "https://bugzilla.suse.com/1133731"
},
{
"category": "self",
"summary": "SUSE Bug 1133769",
"url": "https://bugzilla.suse.com/1133769"
},
{
"category": "self",
"summary": "SUSE Bug 1133772",
"url": "https://bugzilla.suse.com/1133772"
},
{
"category": "self",
"summary": "SUSE Bug 1133774",
"url": "https://bugzilla.suse.com/1133774"
},
{
"category": "self",
"summary": "SUSE Bug 1133778",
"url": "https://bugzilla.suse.com/1133778"
},
{
"category": "self",
"summary": "SUSE Bug 1133779",
"url": "https://bugzilla.suse.com/1133779"
},
{
"category": "self",
"summary": "SUSE Bug 1133780",
"url": "https://bugzilla.suse.com/1133780"
},
{
"category": "self",
"summary": "SUSE Bug 1133825",
"url": "https://bugzilla.suse.com/1133825"
},
{
"category": "self",
"summary": "SUSE Bug 1133850",
"url": "https://bugzilla.suse.com/1133850"
},
{
"category": "self",
"summary": "SUSE Bug 1133851",
"url": "https://bugzilla.suse.com/1133851"
},
{
"category": "self",
"summary": "SUSE Bug 1133852",
"url": "https://bugzilla.suse.com/1133852"
},
{
"category": "self",
"summary": "SUSE Bug 1133897",
"url": "https://bugzilla.suse.com/1133897"
},
{
"category": "self",
"summary": "SUSE Bug 1134090",
"url": "https://bugzilla.suse.com/1134090"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134223",
"url": "https://bugzilla.suse.com/1134223"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134397",
"url": "https://bugzilla.suse.com/1134397"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134600",
"url": "https://bugzilla.suse.com/1134600"
},
{
"category": "self",
"summary": "SUSE Bug 1134607",
"url": "https://bugzilla.suse.com/1134607"
},
{
"category": "self",
"summary": "SUSE Bug 1134618",
"url": "https://bugzilla.suse.com/1134618"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1134945",
"url": "https://bugzilla.suse.com/1134945"
},
{
"category": "self",
"summary": "SUSE Bug 1134946",
"url": "https://bugzilla.suse.com/1134946"
},
{
"category": "self",
"summary": "SUSE Bug 1134947",
"url": "https://bugzilla.suse.com/1134947"
},
{
"category": "self",
"summary": "SUSE Bug 1134948",
"url": "https://bugzilla.suse.com/1134948"
},
{
"category": "self",
"summary": "SUSE Bug 1134949",
"url": "https://bugzilla.suse.com/1134949"
},
{
"category": "self",
"summary": "SUSE Bug 1134950",
"url": "https://bugzilla.suse.com/1134950"
},
{
"category": "self",
"summary": "SUSE Bug 1134951",
"url": "https://bugzilla.suse.com/1134951"
},
{
"category": "self",
"summary": "SUSE Bug 1134952",
"url": "https://bugzilla.suse.com/1134952"
},
{
"category": "self",
"summary": "SUSE Bug 1134953",
"url": "https://bugzilla.suse.com/1134953"
},
{
"category": "self",
"summary": "SUSE Bug 1134972",
"url": "https://bugzilla.suse.com/1134972"
},
{
"category": "self",
"summary": "SUSE Bug 1134974",
"url": "https://bugzilla.suse.com/1134974"
},
{
"category": "self",
"summary": "SUSE Bug 1134975",
"url": "https://bugzilla.suse.com/1134975"
},
{
"category": "self",
"summary": "SUSE Bug 1134980",
"url": "https://bugzilla.suse.com/1134980"
},
{
"category": "self",
"summary": "SUSE Bug 1134981",
"url": "https://bugzilla.suse.com/1134981"
},
{
"category": "self",
"summary": "SUSE Bug 1134983",
"url": "https://bugzilla.suse.com/1134983"
},
{
"category": "self",
"summary": "SUSE Bug 1134987",
"url": "https://bugzilla.suse.com/1134987"
},
{
"category": "self",
"summary": "SUSE Bug 1134989",
"url": "https://bugzilla.suse.com/1134989"
},
{
"category": "self",
"summary": "SUSE Bug 1134990",
"url": "https://bugzilla.suse.com/1134990"
},
{
"category": "self",
"summary": "SUSE Bug 1134994",
"url": "https://bugzilla.suse.com/1134994"
},
{
"category": "self",
"summary": "SUSE Bug 1134995",
"url": "https://bugzilla.suse.com/1134995"
},
{
"category": "self",
"summary": "SUSE Bug 1134998",
"url": "https://bugzilla.suse.com/1134998"
},
{
"category": "self",
"summary": "SUSE Bug 1134999",
"url": "https://bugzilla.suse.com/1134999"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135018",
"url": "https://bugzilla.suse.com/1135018"
},
{
"category": "self",
"summary": "SUSE Bug 1135021",
"url": "https://bugzilla.suse.com/1135021"
},
{
"category": "self",
"summary": "SUSE Bug 1135024",
"url": "https://bugzilla.suse.com/1135024"
},
{
"category": "self",
"summary": "SUSE Bug 1135026",
"url": "https://bugzilla.suse.com/1135026"
},
{
"category": "self",
"summary": "SUSE Bug 1135027",
"url": "https://bugzilla.suse.com/1135027"
},
{
"category": "self",
"summary": "SUSE Bug 1135028",
"url": "https://bugzilla.suse.com/1135028"
},
{
"category": "self",
"summary": "SUSE Bug 1135029",
"url": "https://bugzilla.suse.com/1135029"
},
{
"category": "self",
"summary": "SUSE Bug 1135031",
"url": "https://bugzilla.suse.com/1135031"
},
{
"category": "self",
"summary": "SUSE Bug 1135033",
"url": "https://bugzilla.suse.com/1135033"
},
{
"category": "self",
"summary": "SUSE Bug 1135034",
"url": "https://bugzilla.suse.com/1135034"
},
{
"category": "self",
"summary": "SUSE Bug 1135035",
"url": "https://bugzilla.suse.com/1135035"
},
{
"category": "self",
"summary": "SUSE Bug 1135036",
"url": "https://bugzilla.suse.com/1135036"
},
{
"category": "self",
"summary": "SUSE Bug 1135037",
"url": "https://bugzilla.suse.com/1135037"
},
{
"category": "self",
"summary": "SUSE Bug 1135038",
"url": "https://bugzilla.suse.com/1135038"
},
{
"category": "self",
"summary": "SUSE Bug 1135039",
"url": "https://bugzilla.suse.com/1135039"
},
{
"category": "self",
"summary": "SUSE Bug 1135041",
"url": "https://bugzilla.suse.com/1135041"
},
{
"category": "self",
"summary": "SUSE Bug 1135042",
"url": "https://bugzilla.suse.com/1135042"
},
{
"category": "self",
"summary": "SUSE Bug 1135044",
"url": "https://bugzilla.suse.com/1135044"
},
{
"category": "self",
"summary": "SUSE Bug 1135045",
"url": "https://bugzilla.suse.com/1135045"
},
{
"category": "self",
"summary": "SUSE Bug 1135046",
"url": "https://bugzilla.suse.com/1135046"
},
{
"category": "self",
"summary": "SUSE Bug 1135047",
"url": "https://bugzilla.suse.com/1135047"
},
{
"category": "self",
"summary": "SUSE Bug 1135049",
"url": "https://bugzilla.suse.com/1135049"
},
{
"category": "self",
"summary": "SUSE Bug 1135051",
"url": "https://bugzilla.suse.com/1135051"
},
{
"category": "self",
"summary": "SUSE Bug 1135052",
"url": "https://bugzilla.suse.com/1135052"
},
{
"category": "self",
"summary": "SUSE Bug 1135053",
"url": "https://bugzilla.suse.com/1135053"
},
{
"category": "self",
"summary": "SUSE Bug 1135055",
"url": "https://bugzilla.suse.com/1135055"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135058",
"url": "https://bugzilla.suse.com/1135058"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136188",
"url": "https://bugzilla.suse.com/1136188"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136215",
"url": "https://bugzilla.suse.com/1136215"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1136347",
"url": "https://bugzilla.suse.com/1136347"
},
{
"category": "self",
"summary": "SUSE Bug 1136348",
"url": "https://bugzilla.suse.com/1136348"
},
{
"category": "self",
"summary": "SUSE Bug 1136353",
"url": "https://bugzilla.suse.com/1136353"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136456",
"url": "https://bugzilla.suse.com/1136456"
},
{
"category": "self",
"summary": "SUSE Bug 1136460",
"url": "https://bugzilla.suse.com/1136460"
},
{
"category": "self",
"summary": "SUSE Bug 1136461",
"url": "https://bugzilla.suse.com/1136461"
},
{
"category": "self",
"summary": "SUSE Bug 1136469",
"url": "https://bugzilla.suse.com/1136469"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136498",
"url": "https://bugzilla.suse.com/1136498"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137201",
"url": "https://bugzilla.suse.com/1137201"
},
{
"category": "self",
"summary": "SUSE Bug 1137224",
"url": "https://bugzilla.suse.com/1137224"
},
{
"category": "self",
"summary": "SUSE Bug 1137232",
"url": "https://bugzilla.suse.com/1137232"
},
{
"category": "self",
"summary": "SUSE Bug 1137233",
"url": "https://bugzilla.suse.com/1137233"
},
{
"category": "self",
"summary": "SUSE Bug 1137236",
"url": "https://bugzilla.suse.com/1137236"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137429",
"url": "https://bugzilla.suse.com/1137429"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 1138291",
"url": "https://bugzilla.suse.com/1138291"
},
{
"category": "self",
"summary": "SUSE Bug 1138293",
"url": "https://bugzilla.suse.com/1138293"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12127 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16880 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11091 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9003 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9503 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9503/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-18T16:07:40Z",
"generator": {
"date": "2019-06-18T16:07:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1550-1",
"initial_release_date": "2019-06-18T16:07:40Z",
"revision_history": [
{
"date": "2019-06-18T16:07:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-al-4.12.14-197.4.1.aarch64",
"product_id": "dtb-al-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-allwinner-4.12.14-197.4.1.aarch64",
"product_id": "dtb-allwinner-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-altera-4.12.14-197.4.1.aarch64",
"product_id": "dtb-altera-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-amd-4.12.14-197.4.1.aarch64",
"product_id": "dtb-amd-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-amlogic-4.12.14-197.4.1.aarch64",
"product_id": "dtb-amlogic-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-apm-4.12.14-197.4.1.aarch64",
"product_id": "dtb-apm-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-arm-4.12.14-197.4.1.aarch64",
"product_id": "dtb-arm-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-broadcom-4.12.14-197.4.1.aarch64",
"product_id": "dtb-broadcom-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-cavium-4.12.14-197.4.1.aarch64",
"product_id": "dtb-cavium-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-exynos-4.12.14-197.4.1.aarch64",
"product_id": "dtb-exynos-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-freescale-4.12.14-197.4.1.aarch64",
"product_id": "dtb-freescale-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-hisilicon-4.12.14-197.4.1.aarch64",
"product_id": "dtb-hisilicon-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-lg-4.12.14-197.4.1.aarch64",
"product_id": "dtb-lg-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-marvell-4.12.14-197.4.1.aarch64",
"product_id": "dtb-marvell-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-mediatek-4.12.14-197.4.1.aarch64",
"product_id": "dtb-mediatek-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-nvidia-4.12.14-197.4.1.aarch64",
"product_id": "dtb-nvidia-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-qcom-4.12.14-197.4.1.aarch64",
"product_id": "dtb-qcom-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-renesas-4.12.14-197.4.1.aarch64",
"product_id": "dtb-renesas-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-rockchip-4.12.14-197.4.1.aarch64",
"product_id": "dtb-rockchip-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-socionext-4.12.14-197.4.1.aarch64",
"product_id": "dtb-socionext-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-sprd-4.12.14-197.4.1.aarch64",
"product_id": "dtb-sprd-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-xilinx-4.12.14-197.4.1.aarch64",
"product_id": "dtb-xilinx-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-4.12.14-197.4.1.aarch64",
"product": {
"name": "dtb-zte-4.12.14-197.4.1.aarch64",
"product_id": "dtb-zte-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.4.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.4.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.4.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.4.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.4.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.4.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.4.1.noarch",
"product_id": "kernel-devel-4.12.14-197.4.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.4.1.noarch",
"product_id": "kernel-docs-4.12.14-197.4.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.4.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.4.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.4.1.noarch",
"product_id": "kernel-macros-4.12.14-197.4.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.4.1.noarch",
"product_id": "kernel-source-4.12.14-197.4.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.4.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.4.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.4.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.4.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.4.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.4.1.s390x",
"product_id": "kernel-syms-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.4.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.4.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.4.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.4.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.4.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.4.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.4.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.4.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.4.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.4.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.4.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.4.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.4.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.4.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.4.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.4.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.4.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.4.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.4.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.4.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-197.4.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-197.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12127"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12127",
"url": "https://www.suse.com/security/cve/CVE-2018-12127"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-12127"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-16880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16880"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16880",
"url": "https://www.suse.com/security/cve/CVE-2018-16880"
},
{
"category": "external",
"summary": "SUSE Bug 1122767 for CVE-2018-16880",
"url": "https://bugzilla.suse.com/1122767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-16880"
},
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11091"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11091",
"url": "https://www.suse.com/security/cve/CVE-2019-11091"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1133319"
},
{
"category": "external",
"summary": "SUSE Bug 1135394 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1135394"
},
{
"category": "external",
"summary": "SUSE Bug 1138043 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1138043"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-11091"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11811",
"url": "https://www.suse.com/security/cve/CVE-2019-11811"
},
{
"category": "external",
"summary": "SUSE Bug 1134397 for CVE-2019-11811",
"url": "https://bugzilla.suse.com/1134397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "low"
}
],
"title": "CVE-2019-11811"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-12818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12818"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12818",
"url": "https://www.suse.com/security/cve/CVE-2019-12818"
},
{
"category": "external",
"summary": "SUSE Bug 1138293 for CVE-2019-12818",
"url": "https://bugzilla.suse.com/1138293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-12818"
},
{
"cve": "CVE-2019-12819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12819"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12819",
"url": "https://www.suse.com/security/cve/CVE-2019-12819"
},
{
"category": "external",
"summary": "SUSE Bug 1138291 for CVE-2019-12819",
"url": "https://bugzilla.suse.com/1138291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "low"
}
],
"title": "CVE-2019-12819"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-9003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \"service ipmievd restart\" loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9003",
"url": "https://www.suse.com/security/cve/CVE-2019-9003"
},
{
"category": "external",
"summary": "SUSE Bug 1126704 for CVE-2019-9003",
"url": "https://bugzilla.suse.com/1126704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-9003"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2019-9503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9503"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9503",
"url": "https://www.suse.com/security/cve/CVE-2019-9503"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1132828"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1133319"
},
{
"category": "external",
"summary": "SUSE Bug 1156653 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1156653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_4-default-1-3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.4.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.4.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T16:07:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-9503"
}
]
}
suse-su-2019:2430-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-source-rt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12126 CVE-2018-12127 CVE-2018-12130: Microarchitectural Store Buffer Data Sampling (MSBDS): Stored buffers on some microprocessors utilizing speculative execution which may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1103186)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019. (bsc#1111331)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). (bsc#1136586)\n- CVE-2019-10124: An issue was discovered in the hwpoison implementation in mm/memory-failure.c in the Linux kernel. When soft_offline_in_use_page() runs on a thp tail page after pmd is split, an attacker could cause a denial of service (bsc#1130699).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions. (bsc#1133188)\n- CVE-2019-11811: An issue was discovered in the Linux kernel There was a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module was removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. (bsc#1134397)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It could occur with FUSE requests. (bsc#1133190)\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem. (bsc#1135281)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bsc#1120843)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bsc#1135603)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bsc#1134848)\n- CVE-2019-9500: An issue was discovered that lead to brcmfmac heap buffer overflow. (bsc#1132681)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bsc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bsc#1135278)\n- CVE-2018-16880: A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may have lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (bsc#1122767)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-3882: A flaw was found in the Linux kernel\u0027s vfio interface implementation that permitted violation of the user\u0027s locked memory limit. If a device was bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may have caused a system memory exhaustion and thus a denial of service (DoS). (bsc#1131427)\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bsc#1136424)\n- CVE-2019-8564: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132673)\n- CVE-2019-9503: An issue was discoved which meant that brcmfmac frame validation could be bypassed. (bsc#1132828)\n- CVE-2019-9003: In the Linux kernel, attackers could trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \u0027service ipmievd restart\u0027 loop. (bsc#1126704)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2019-12817: On the PowerPC architecture, local attackers could access other users processes memory (bnc#1138263).\n- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may have been conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses (bnc#1140575 1140577).\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image was exposed. This attack could be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace (bnc#1140577).\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c (bnc#1131645 1133738).\n- CVE-2019-13233: In arch/x86/lib/insn-eval.c in the Linux kernel, there was a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation (bnc#1140454).\n- CVE-2018-20855: An issue was discovered in the Linux kernel In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace(bsc#1143045).\n- CVE-2019-1125: Exclude ATOMs from speculation through SWAPGS (bsc#1139358).\n- CVE-2019-11810: An issue was discovered in the Linux kernel A NULL pointer dereference could occur when megasas_create_frame_pool() failed in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This caused a Denial of Service, related to a use-after-free (bnc#1134399).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel, a malicious USB device could send an HID report that triggered an out-of-bounds write during generation of debugging messages. (bnc#1142023)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user could cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sent a crafted signal frame. (bnc#1142254)\n- CVE-2019-14283: In the Linux kernel, set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It could be triggered by an unprivileged local user when a floppy disk was inserted. NOTE: QEMU creates the floppy device by default. (bnc#1143191)\n- CVE-2019-14284: In the Linux kernel, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. (bnc#1143189)\n- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used. (bsc#1136922)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. (bsc#1136598)\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: Off by one handling nexthdr (bsc#1051510).\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- 9p: do not trust pdu content for stat item size (bsc#1051510).\n- ARM: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- ARM: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- ARM: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- ARM: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- ARM: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- ARM: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- ARM: iop: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: orion: don\u0027t use using 64-bit DMA masks (bsc#1051510).\n- ARM: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- ARM: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- ASoC: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- ASoC: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fix valid stream condition (bsc#1051510).\n- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- ASoC: fsl_esai: fix channel swap issue when stream starts (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- ASoC: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- ASoC: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ASoC: stm32: fix sai driver name initialisation (bsc#1051510).\n- ASoC: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- ASoC: topology: free created components in tplg load error (bsc#1051510).\n- ASoC: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- Backporting hwpoison fixes\n- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- Bluetooth: btusb: request wake pin with NOAUTOEN (bsc#1051510).\n- Bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- CIFS: Do not count -ENODATA as failure for query directory (bsc#1051510).\n- CIFS: Do not hide EINTR after sending network packets (bsc#1051510).\n- CIFS: Do not reconnect TCP session in add_credits() (bsc#1051510).\n- CIFS: Do not reset lease state to NONE on lease break (bsc#1051510).\n- CIFS: Fix adjustment of credits for MTU requests (bsc#1051510).\n- CIFS: Fix credit calculation for encrypted reads with errors (bsc#1051510).\n- CIFS: Fix credits calculations for reads with errors (bsc#1051510).\n- CIFS: Fix possible hang during async MTU reads and writes (bsc#1051510).\n- CIFS: Fix read after write for files with read caching (bsc#1051510).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- CIFS: fix POSIX lock leak and invalid ptr deref (bsc#1114542).\n- Correct iwlwifi 22000 series ucode file name (bsc#1142673)\n- Correct the buggy backport about AER / DPC pcie stuff (bsc#1142623)\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Delete patches.fixes/s390-setup-fix-early-warning-messages (bsc#1140948).\n- Disable kgdboc failed by echo space to /sys/module/kgdboc/parameters/kgdboc (bsc#1051510).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not restrict NFSv4.2 on openSUSE (bsc#1138719).\n- Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- EDAC/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- Fix cpu online check (bsc#1051510).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: core: move Usage Page concatenation to Main item (bsc#1093389).\n- HID: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- HID: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- HID: input: add mapping for Assistant key (bsc#1051510).\n- HID: input: add mapping for Expose/Overview key (bsc#1051510).\n- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- HID: intel-ish-hid: avoid binding wrong ishtp_cl_device (bsc#1051510).\n- HID: intel-ish: ipc: handle PIMR before ish_wakeup also clear PISR busy_clear bit (bsc#1051510).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- IB/hfi1: Clear the IOWAIT pending bits when QP is put into error state (bsc#1114685 FATE#325854).\n- IB/hfi1: Create inline to get extended headers (bsc#1114685 FATE#325854).\n- IB/hfi1: Validate fault injection opcode user input (bsc#1114685 FATE#325854).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1103992 FATE#326009).\n- IB/mlx5: Fixed reporting counters on 2nd port for Dual port RoCE (bsc#1103991 FATE#326007).\n- IB/mlx5: Verify DEVX general object type correctly (bsc#1103991 FATE#326007).\n- Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: introduce KEY_ASSISTANT (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- Input: synaptics-rmi4 - write config register values to the right offset (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- KEYS: always initialize keyring_index_key::desc_len (bsc#1051510).\n- KEYS: user: Align the payload buffer (bsc#1051510).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts (bsc#1114279).\n- MD: fix invalid stored role for a disk (bsc#1051510).\n- NFC: nci: Add some bounds checking in nci_hci_cmd_received() (bsc#1051510).\n- PCI/P2PDMA: fix the gen_pool_add_virt() failure path (bsc#1103992 FATE#326009).\n- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bsc#1051510).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: designware-ep: Read-only registers need DBI_RO_WR_EN to be writable (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- PM / core: Propagate dev power.wakeup_path when no callbacks (bsc#1051510).\n- RAS/CEC: Check the correct variable in the debugfs error handling (bsc#1085535).\n- RAS/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- RAS/CEC: Fix binary search function (bsc#1114279).\n- RDMA/ipoib: Allow user space differentiate between valid dev_port (bsc#1103992 FATE#326009).\n- RDMA/mlx5: Do not allow the user to write to the clock page (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Initialize roce port info before multiport master init (bsc#1103991 FATE#326007).\n- RDMA/mlx5: Use rdma_user_map_io for mapping BAR pages (bsc#1103992 FATE#326009).\n- RDMA/odp: Fix missed unlock in non-blocking invalidate_start (bsc#1103992 FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992, FATE#326009).\n- RDMA/srp: Accept again source addresses that do not have a port number (bsc#1103992 FATE#326009).\n- RDMA/srp: Document srp_parse_in() arguments (bsc#1103992 FATE#326009).\n- RDMA/uverbs: check for allocation failure in uapi_add_elm() (bsc#1103992 FATE#326009).\n- Re-export snd_cards for kABI compatibility (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027 \n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027net: ena: ethtool: add extra properties retrieval via get_priv_flags\u0027 (bsc#1138879).\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027 This broke the build with older gcc instead.\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- SMB3: Fix endian warning (bsc#1137884).\n- UAS: fix alignment of scatter/gather segments (bsc#1129770).\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- USB: cdc-acm: fix unthrottle races (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- USB: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- USB: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: cp210x: fix GPIO in autosuspend (bsc#1120902).\n- USB: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- USB: serial: fix unthrottle races (bsc#1051510).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- USB: yurex: Fix protection fault after device removal (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- acpi / SBS: Fix GPE storm on recent MacBookPro\u0027s (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi, nfit: Prefer _DSM over _LSR for namespace label reads (bsc#1112128) (bsc#1132426).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi: PM: Set enable_for_wake for wakeup GPEs during suspend-to-idle (bsc#1111666).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi: property: restore _DSD data subnodes GUID comment (bsc#1111666).\n- acpiCA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpiCA: Clear status of GPEs on first direct enable (bsc#1111666).\n- acpiCA: Namespace: remove address node from global list after method termination (bsc#1051510).\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- alsa: PCM: check if ops are defined before suspending PCM (bsc#1051510).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: core: Don\u0027t refer to snd_cards array directly (bsc#1051510).\n- alsa: core: Fix card races between register and disconnect (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Add two more machines to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Don\u0027t resume forcibly i915 HDMI/DP codec (bsc#1111666).\n- alsa: hda - Fix intermittent CORB/RIRB stall on Intel chips (bsc#1111666).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda - Optimize resume for codecs without jack detection (bsc#1111666).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Fix i915 reverse port/pin mapping (bsc#1111666).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/hdmi - Remove duplicated define (bsc#1111666).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda/realtek - Move to ACT_INIT state (bsc#1111666).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC256 (bsc#1051510).\n- alsa: hda/realtek - Support low power consumption for ALC295 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: hda/realtek - add two more pin configuration sets to quirk table (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer TravelMate B114-21 with ALC233 (bsc#1111666).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda: Initialize power_state field properly (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: info: Fix racy addition/deletion of nodes (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix OOB-reads from strlcpy (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Fix parse of UAC2 Extension Units (bsc#1111666).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- alsa: usb-audio: fix Line6 Helix audio format rates (bsc#1111666).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: do not override dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- arm64: fix acpi dependencies (bsc#1117158).\n- assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1127371).\n- at76c50x-usb: Don\u0027t register led_trigger if usb_register_driver failed (bsc#1051510).\n- ath10k: Do not send probe response template for mesh (bsc#1111666).\n- ath10k: Fix encoding for protected management frames (bsc#1111666).\n- ath10k: add missing error handling (bsc#1111666).\n- ath10k: add peer id check in ath10k_peer_find_by_id (bsc#1111666).\n- ath10k: avoid possible string overflow (bsc#1051510).\n- ath10k: destroy sdio workqueue while remove sdio module (bsc#1111666).\n- ath10k: fix PCIE device wake up failed (bsc#1111666).\n- ath10k: fix incorrect multicast/broadcast rate setting (bsc#1111666).\n- ath10k: snoc: fix unbalanced clock error handling (bsc#1111666).\n- ath6kl: add some bounds checking (bsc#1051510).\n- ath9k: Check for errors when reading SREV register (bsc#1111666).\n- ath9k: correctly handle short radar pulses (bsc#1111666).\n- ath: DFS JP domain W56 fixed pulse type 3 RADAR detection (bsc#1111666).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: Reduce claim hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_global hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: Reduce tt_local hash refcnt only for removed entry (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set flush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca meta_sectors_written (bsc#1130972).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comment for cache_set fill_iter (bsc#1130972).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(b write_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c gc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: destroy dc writeback_write_wq if failed to create dc writeback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: do not set max writeback rate if gc is running (bsc#1140652).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: set largest seq to ja seq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: Avoid that submitting a bio concurrently with device removal triggers a crash (bsc#1131673).\n- blk-mq: adjust debugfs and sysfs register when updating nr_hw_queues (bsc#1131673).\n- blk-mq: change gfp flags to GFP_NOIO in blk_mq_realloc_hw_ctxs (bsc#1131673).\n- blk-mq: fallback to previous nr_hw_queues when updating fails (bsc#1131673).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- blk-mq: init hctx sched after update ctx and hctx mapping (bsc#1131673).\n- blk-mq: realloc hctx when hw queue is mapped to another node (bsc#1131673).\n- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter (bsc#1131673).\n- blkcg: Introduce blkg_root_lookup() (bsc#1131673).\n- blkcg: Make blkg_root_lookup() work for queues in bypass mode (bsc#1131673).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: Ensure that a request queue is dissociated from the cgroup controller (bsc#1131673).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- block: Fix a race between request queue removal and the block cgroup controller (bsc#1131673).\n- block: Introduce blk_exit_queue() (bsc#1131673).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- block: kABI fixes for bio_rewind_iter() removal (bsc#1131673).\n- block: remove bio_rewind_iter() (bsc#1131673).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() (bsc#1133731).\n- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnx2x: Remove set but not used variable \u0027mfw_vn\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix spelling mistake \u0027dicline\u0027 \u0027decline\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Disable bus master during PCI shutdown and driver unload (bsc#1104745 FATE#325918).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic for RDMA driver (bsc#1104745 FATE#325918).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242 FATE#322914).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Suppress error messages when querying DSCP DCB capabilities (bsc#1104745 FATE#325918).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, devmap: Add missing RCU read lock on flush (bsc#1109837).\n- bpf, devmap: Add missing bulk queue free (bsc#1109837).\n- bpf, devmap: Fix premature entry free on destroying map (bsc#1109837).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf, tcp: correctly handle DONT_WAIT flags and timeo == 0 (bsc#1109837).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: btf: fix the brackets of BTF_INT_OFFSET() (bsc#1083647).\n- bpf: devmap: fix use-after-free Read in __dev_map_entry_free (bsc#1109837).\n- bpf: fix callees pruning callers (bsc#1109837).\n- bpf: fix nested bpf tracepoints with per-cpu data (bsc#1083647).\n- bpf: fix use after free in bpf_evict_inode (bsc#1083647).\n- bpf: lpm_trie: check left child of last leftmost node for NULL (bsc#1109837).\n- bpf: sockmap fix msg sg.size account on ingress skb (bsc#1109837).\n- bpf: sockmap remove duplicate queue free (bsc#1109837).\n- bpf: sockmap, fix use after free from sleep in psock backlog workqueue (bsc#1109837).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix leak of mypkt on error return path (bsc#1111666).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix assertion failure on fsync with NO_HOLES enabled (bsc#1131848).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix incorrect file size after shrinking truncate and fsync (bsc#1130195).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove WARN_ON in log_dir_items (bsc#1131847).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- carl9170: fix misuse of device driver API (bsc#1111666).\n- cdrom: Fix race condition in cdrom_sysctl_register (bsc#1051510).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: factor out ceph_lookup_inode() (bsc#1138681).\n- ceph: fix NULL pointer deref when debugging is enabled (bsc#1138681).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix ci i_head_snapc leak (bsc#1122776).\n- ceph: fix potential use-after-free in ceph_mdsc_build_path (bsc#1138681).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1138681).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- ceph: print inode number in __caps_issued_mask debugging messages (bsc#1138681).\n- ceph: quota: fix quota subdir mounts (bsc#1138681).\n- ceph: remove duplicated filelock ref increase (bsc#1138681).\n- cfg80211: Handle WMM rules in regulatory domain intersection (bsc#1111666).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- cgroup: fix parsing empty mount option string (bsc#1133094).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).\n- cifs: Fix potential OOB access of lock element array (bsc#1051510).\n- cifs: don\u0027t dereference smb_file_target before null check (bsc#1051510). \n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: fractional-divider: check parent rate only if flag is set (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: rockchip: fix frac settings of GPLL clock for rk3328 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- clk: x86: Add system specific quirk to mark clocks as critical (bsc#1051510).\n- config: arm64: enable CN99xx uncore pmu References: bsc#1117114\n- configfs: Fix use-after-free when accessing sd s_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm/aes-neonbs - don\u0027t access already-freed walk.iv (bsc#1051510).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: caam - add missing put_device() call (bsc#1129770).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: caam/qi2 - fix DMA mapping of stack memory (bsc#1111666).\n- crypto: caam/qi2 - fix zero-length buffer DMA mapping (bsc#1111666).\n- crypto: caam/qi2 - generate hash keys in-place (bsc#1111666).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).\n- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix passing zero to \u0027PTR_ERR\u0027 warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Handle pci shutdown event (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variable \u0027kctx_len\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variables \u0027adap\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove set but not used variables \u0027err, adap, request, hws\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: pcbc - remove bogus memcpy()s with src == dest (bsc#1051510).\n- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bsc#1051510).\n- crypto: skcipher - don\u0027t WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bsc#1051510).\n- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Add support for SGE doorbell queue timer (bsc#1127371).\n- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Fix mac_hlist initialization and free (bsc#1127374).\n- cxgb4/cxgb4vf: Fix up netdev hw_features (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Link management changes (bsc#1127371).\n- cxgb4/cxgb4vf: Program hash region for {t4/t4vf}_change_mac() (bsc#1127371).\n- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add capability to get/set SGE Doorbell Queue Timer Tick (bsc#1127371).\n- cxgb4: Add flag tc_flower_initialized (bsc#1127371).\n- cxgb4: Add new T5 pci device id 0x50ae (bsc#1127371).\n- cxgb4: Add new T5 pci device ids 0x50af and 0x50b0 (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608a (bsc#1127371).\n- cxgb4: Add new T6 pci device ids 0x608b (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add support for FW_ETH_TX_PKT_VM_WR (bsc#1127371).\n- cxgb4: Add support to read actual provisioned resources (bsc#1127371).\n- cxgb4: Added missing break in ndo_udp_tunnel_{add/del} (bsc#1127371).\n- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Export sge_host_page_size to ulds (bsc#1127371).\n- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Mask out interrupts that are not enabled (bsc#1127175).\n- cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size (bsc#1127371).\n- cxgb4: Revert \u0027cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Support ethtool private flags (bsc#1127371).\n- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).\n- cxgb4: add per rx-queue counter for packet errors (bsc#1127371).\n- cxgb4: add support to display DCB info (bsc#1127371).\n- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).\n- cxgb4: collect ASIC LA dumps from ULP TX (bsc#1127371).\n- cxgb4: collect hardware queue descriptors (bsc#1127371).\n- cxgb4: collect number of free PSTRUCT page pointers (bsc#1127371).\n- cxgb4: convert flower table to use rhashtable (bsc#1127371).\n- cxgb4: cxgb4: use FW_PORT_ACTION_L1_CFG32 for 32 bit capability (bsc#1127371).\n- cxgb4: display number of rx and tx pages free (bsc#1127371).\n- cxgb4: do not return DUPLEX_UNKNOWN when link is down (bsc#1127371).\n- cxgb4: fix the error path of cxgb4_uld_register() (bsc#1127371).\n- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4: impose mandatory VLAN usage when non-zero TAG ID (bsc#1127371).\n- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).\n- cxgb4: move Tx/Rx free pages collection to common code (bsc#1127371).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove redundant assignment to vlan_cmd.dropnovlan_fm (bsc#1127371).\n- cxgb4: remove set but not used variables \u0027multitrc, speed\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove the unneeded locks (bsc#1127371).\n- cxgb4: specify IQTYPE in fw_iq_cmd (bsc#1127371).\n- cxgb4: update supported DCB version (bsc#1127371).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use new fw interface to get the VIN and smt index (bsc#1127371).\n- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Few more link management changes (bsc#1127374).\n- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Update port information in cxgb4vf_open() (bsc#1127374).\n- cxgb4vf: fix memleak in mac_hlist initialization (bsc#1127374).\n- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- device_cgroup: fix RCU imbalance in error case (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dm: disable DISCARD if the underlying storage no longer supports it (bsc#1114638).\n- dma-buf: Discard old fence_excl on retrying get_fences_rcu for realloc (bsc#1111666).\n- dma-direct: add support for allocation from ZONE_DMA and ZONE_DMA32 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: do not retry allocation for no-op GFP_DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-direct: retry allocations using GFP_DMA for small masks (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move dma_mark_clean to dma-direct.h (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: move swiotlb arch helpers to a new header (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dma-mapping: take dma_pfn_offset into account in dma_max_pfn (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: axi-dmac: Don\u0027t check the number of frames for alignment (bsc#1051510).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: qcom_hidma: assign channel cookie correctly (bsc#1051510).\n- dmaengine: sh: rcar-dmac: With cyclic DMA residue 0 is valid (bsc#1051510).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- dmaengine: tegra: avoid overflow of byte tracking (bsc#1051510).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers/base/devres: introduce devm_release_action() (bsc#1103992 FATE#326009).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers: depend on HAS_IOMEM for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: fix a typo in the kernel doc for devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: hv: vmbus: Offload the handling of channels to two workqueues (bsc#1130567).\n- drivers: hv: vmbus: Reset the channel callback in vmbus_onoffer_rescind() (bsc#1130567).\n- drivers: provide devm_platform_ioremap_resource() (bsc#1136333 jsc#SLE-4994).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: If one stream full updates, full update all planes (bsc#1111666).\n- drm/amd/display: Make some functions static (bsc#1111666).\n- drm/amd/display: Set stream mode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane color_space for dpp if specified (bsc#1111666).\n- drm/amd/display: extending AUX SW Timeout (bsc#1111666).\n- drm/amd/display: fix cursor black issue (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/powerplay: use hardware fan control if no powerplay fan table (bsc#1111666).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/amdgpu/gmc9: fix VM_L2_CNTL3 programming (bsc#1111666).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm/amdkfd: use init_mqd function to allocate object for hid_mqd (CI) (bsc#1111666).\n- drm/arm/hdlcd: Actually validate CRTC modes (bsc#1111666).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/arm/mali-dp: Add a loop around the second set CVAL and try 5 times (bsc#1111666).\n- drm/atmel-hlcdc: revert shift by 8 (bsc#1111666).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/doc: Drop \u0027content type\u0027 from the legacy kms property table (bsc#1111666).\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm/etnaviv: add missing failure path to destroy suballoc (bsc#1111666).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/exynos/mixer: fix MIXER shadow registry synchronisation code (bsc#1111666).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/fb-helper: generic: Call drm_client_add() after setup is done (bsc#1111666).\n- drm/fb-helper: generic: Don\u0027t take module ref for fbcon (bsc#1111666).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113722)\n- drm/i915/gvt: Add in context mmio 0x20D8 to gen9 mmio list (bsc#1113956)\n- drm/i915/gvt: Annotate iomem usage (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: Prevent use-after-free in ppgtt_free_all_spt() (bsc#1111666).\n- drm/i915/gvt: Roundup fb height into tile\u0027s height at calucation fb size (bsc#1111666).\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not deliver a workload if its creation fails (bsc#1051510).\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113722)\n- drm/i915/gvt: do not let pin count of shadow mm go negative (bsc#1113956)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/icl: Add WaDisableBankHangMode (bsc#1111666).\n- drm/i915/icl: Whitelist GEN9_SLICE_COMMON_ECO_CHICKEN1 (bsc#1111666).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Disable tv output on i9x5gm (bsc#1086657, bsc#1133897).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/i915: Force 2*96 MHz cdclk on glk/cnl when audio power is enabled (bsc#1111666).\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/imx: don\u0027t skip DP channel disable for background plane (bsc#1051510).\n- drm/imx: notify drm core before sending event during crtc disable (bsc#1111666).\n- drm/imx: only send event on crtc disable if kept disabled (bsc#1111666).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113722)\n- drm/mediatek: Fix an error code in mtk_hdmi_dt_parse_pdata() (bsc#1113956)\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/meson: Add support for XBGR8888 ABGR8888 formats (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/msm/mdp5: Fix mdp5_cfg_init error return (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/bar/tu104: initial support (bsc#1133593).\n- drm/nouveau/bar/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios/tu104: initial support (bsc#1133593).\n- drm/nouveau/bios/tu106: initial support (bsc#1133593).\n- drm/nouveau/bios: translate additional memory types (bsc#1133593).\n- drm/nouveau/bios: translate usb-C connector type (bsc#1133593).\n- drm/nouveau/bus/tu104: initial support (bsc#1133593).\n- drm/nouveau/bus/tu106: initial support (bsc#1133593).\n- drm/nouveau/ce/tu104: initial support (bsc#1133593).\n- drm/nouveau/ce/tu106: initial support (bsc#1133593).\n- drm/nouveau/core: increase maximum number of nvdec instances to 3 (bsc#1133593).\n- drm/nouveau/core: recognise TU102 (bsc#1133593).\n- drm/nouveau/core: recognise TU104 (bsc#1133593).\n- drm/nouveau/core: recognise TU106 (bsc#1133593).\n- drm/nouveau/core: support multiple nvdec instances (bsc#1133593).\n- drm/nouveau/devinit/gm200-: export function to upload+execute PMU/PRE_OS (bsc#1133593).\n- drm/nouveau/devinit/tu104: initial support (bsc#1133593).\n- drm/nouveau/devinit/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/disp/gm200-: add scdc parameter setter (bsc#1133593).\n- drm/nouveau/disp/gv100: fix name of window channels in debug output (bsc#1133593).\n- drm/nouveau/disp/tu104: initial support (bsc#1133593).\n- drm/nouveau/disp/tu106: initial support (bsc#1133593).\n- drm/nouveau/disp: add a way to configure scrambling/tmds for hdmi 2.0 (bsc#1133593).\n- drm/nouveau/disp: add support for setting scdc parameters for high modes (bsc#1133593).\n- drm/nouveau/disp: keep track of high-speed state, program into clock (bsc#1133593).\n- drm/nouveau/disp: take sink support into account for exposing 594mhz (bsc#1133593).\n- drm/nouveau/dma/tu104: initial support (bsc#1133593).\n- drm/nouveau/dma/tu106: initial support (bsc#1133593).\n- drm/nouveau/drm/nouveau: Do not forget to label dp_aux devices (bsc#1133593).\n- drm/nouveau/drm/nouveau: s/nouveau_backlight_exit/nouveau_backlight_fini/ (bsc#1133593).\n- drm/nouveau/drm/nouveau: tegra: Call nouveau_drm_device_init() (bsc#1133593).\n- drm/nouveau/fault/tu104: initial support (bsc#1133593).\n- drm/nouveau/fault/tu106: initial support (bsc#1133593).\n- drm/nouveau/fault: add explicit control over fault buffer interrupts (bsc#1133593).\n- drm/nouveau/fault: remove manual mapping of fault buffers into BAR2 (bsc#1133593).\n- drm/nouveau/fault: store get/put pri address in nvkm_fault_buffer (bsc#1133593).\n- drm/nouveau/fb/tu104: initial support (bsc#1133593).\n- drm/nouveau/fb/tu106: initial support (bsc#1133593).\n- drm/nouveau/fifo/gf100-: call into BAR to reset BARs after MMU fault (bsc#1133593).\n- drm/nouveau/fifo/gk104-: group pbdma functions together (bsc#1133593).\n- drm/nouveau/fifo/gk104-: return channel instance in ctor args (bsc#1133593).\n- drm/nouveau/fifo/gk104-: separate runlist building from committing to hw (bsc#1133593).\n- drm/nouveau/fifo/gk104-: support enabling privileged ce functions (bsc#1133593).\n- drm/nouveau/fifo/gk104-: virtualise pbdma enable function (bsc#1133593).\n- drm/nouveau/fifo/gm200-: read pbdma count more directly (bsc#1133593).\n- drm/nouveau/fifo/gv100: allocate method buffer (bsc#1133593).\n- drm/nouveau/fifo/gv100: return work submission token in channel ctor args (bsc#1133593).\n- drm/nouveau/fifo/tu104: initial support (bsc#1133593).\n- drm/nouveau/fifo/tu106: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu104: initial support (bsc#1133593).\n- drm/nouveau/fuse/tu106: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu104: initial support (bsc#1133593).\n- drm/nouveau/gpio/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu104: initial support (bsc#1133593).\n- drm/nouveau/i2c/tu106: initial support (bsc#1133593).\n- drm/nouveau/i2c: Disable i2c bus access after fini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads busses during preinit (bsc#1051510).\n- drm/nouveau/ibus/tu104: initial support (bsc#1133593).\n- drm/nouveau/ibus/tu106: initial support (bsc#1133593).\n- drm/nouveau/imem/nv50: support pinning objects in BAR2 and returning address (bsc#1133593).\n- drm/nouveau/imem/tu104: initial support (bsc#1133593).\n- drm/nouveau/imem/tu106: initial support (bsc#1133593).\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/nouveau/kms/nv50-: allow more flexibility with lut formats (bsc#1133593).\n- drm/nouveau/kms/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu104: initial support (bsc#1133593).\n- drm/nouveau/ltc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mc/tu104: initial support (bsc#1133593).\n- drm/nouveau/mc/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/mmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/mmu: add more general vmm free/node handling functions (bsc#1133593).\n- drm/nouveau/pci/tu104: initial support (bsc#1133593).\n- drm/nouveau/pci/tu106: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu104: initial support (bsc#1133593).\n- drm/nouveau/pmu/tu106: initial support (bsc#1133593).\n- drm/nouveau/therm/tu104: initial support (bsc#1133593).\n- drm/nouveau/therm/tu106: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu104: initial support (bsc#1133593).\n- drm/nouveau/tmr/tu106: initial support (bsc#1133593).\n- drm/nouveau/top/tu104: initial support (bsc#1133593).\n- drm/nouveau/top/tu106: initial support (bsc#1133593).\n- drm/nouveau/volt/gf117: fix speedo readout register (bsc#1051510).\n- drm/nouveau: Add NV_PRINTK_ONCE and variants (bsc#1133593).\n- drm/nouveau: Add size to vbios.rom file in debugfs (bsc#1133593).\n- drm/nouveau: Add strap_peek to debugfs (bsc#1133593).\n- drm/nouveau: Cleanup indenting in nouveau_backlight.c (bsc#1133593).\n- drm/nouveau: Fix potential memory leak in nouveau_drm_load() (bsc#1133593).\n- drm/nouveau: Move backlight device into nouveau_connector (bsc#1133593).\n- drm/nouveau: Refactor nvXX_backlight_init() (bsc#1133593).\n- drm/nouveau: Remove unecessary dma_fence_ops (bsc#1133593).\n- drm/nouveau: Start using new drm_dev initialization helpers (bsc#1133593).\n- drm/nouveau: Stop using drm_crtc_force_disable (bsc#1051510).\n- drm/nouveau: add DisplayPort CEC-Tunneling-over-AUX support (bsc#1133593).\n- drm/nouveau: register backlight on pascal and newer (bsc#1133593).\n- drm/nouveau: remove left-over struct member (bsc#1133593).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/omap: hdmi4_cec: Fix CEC clock handling for PM (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/panel: panel-innolux: set display off in innolux_panel_unprepare (bsc#1111666).\n- drm/pl111: Initialize clock spinlock early (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1111666).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/rockchip: vop: reset scale mode when win is disabled (bsc#1113722)\n- drm/sun4i: Add missing drm_atomic_helper_shutdown at driver unbind (bsc#1113722)\n- drm/sun4i: Fix component unbinding and component master deletion (bsc#1113722)\n- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY configuration for 148.5 MHz (bsc#1111666).\n- drm/sun4i: Set device driver data at bind time for use in unbind (bsc#1113722)\n- drm/sun4i: Unbind components before releasing DRM and memory (bsc#1113722)\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/sun4i: tcon top: Fix NULL/invalid pointer dereference in sun8i_tcon_top_un/bind (bsc#1111666).\n- drm/tegra: gem: Fix CPU-cache maintenance for BO\u0027s allocated using get_pages() (bsc#1111666).\n- drm/tegra: hub: Fix dereference before check (bsc#1111666).\n- drm/ttm: Fix bo_global and mem_global kfree error (bsc#1111666).\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/ttm: fix out-of-bounds read in ttm_put_pages() v2 (bsc#1111666).\n- drm/udl: Replace drm_dev_unref with drm_dev_put (bsc#1111666).\n- drm/udl: add a release method and delay modeset teardown (bsc#1085536)\n- drm/udl: introduce a macro to convert dev to udl (bsc#1111666).\n- drm/udl: move to embedding drm device inside udl device (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1113722)\n- drm/vc4: fix fb references in async update (bsc#1141312).\n- drm/vmwgfx: Don\u0027t send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: Honor the sg list segment size limitation (bsc#1111666).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: Remove set but not used variable \u0027restart\u0027 (bsc#1111666).\n- drm/vmwgfx: Use the backdoor port if the HB port is not available (bsc#1111666).\n- drm/vmwgfx: fix a warning due to missing dma_parms (bsc#1111666).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm: Auto-set allow_fb_modifiers when given modifiers at plane init (bsc#1051510).\n- drm: Fix drm_release() and device unplug (bsc#1111666).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Rockchip SoCs (bsc#1113722)\n- drm: don\u0027t block fb changes for async plane updates (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD MicroPC (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for GPD pocket2 (bsc#1111666).\n- drm: rcar-du: Fix rcar_du_crtc structure documentation (bsc#1111666).\n- drm: return -EFAULT if copy_to_user() fails (bsc#1111666).\n- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).\n- drm_dp_cec: check that aux has a transfer function (bsc#1136978).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- e1000e: Fix -Wformat-truncation warnings (bsc#1051510).\n- e1000e: fix cyclic resets at link up with active tx (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: Do not warn when enabling DAX (bsc#1132894).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bsc#1131851).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- failover: allow name change on IFF_UP slave interfaces (bsc#1109837).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bsc#1051510).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix cgroup_do_mount() handling of failure exits (bsc#1133095).\n- fm10k: Fix a potential NULL pointer dereference (bsc#1051510).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: avoid fdput() after failed fdget() in vfs_dedupe_file_range() (bsc#1132384, bsc#1132219).\n- fs: hugetlbfs: fix hwpoison reserve accounting (bsc#1139712) \n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- futex: Cure exit race (bsc#1050549).\n- futex: Ensure that futex address is aligned in handle_futex_death() (bsc#1050549).\n- futex: Handle early deadlock return correctly (bsc#1050549).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: adnp: Fix testing wrong value in adnp_gpio_direction_input (bsc#1051510).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: gpio-omap: fix level interrupt idling (bsc#1051510).\n- gpio: of: Fix of_gpiochip_add() error path (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- gpu: ipu-v3: ipu-ic: Fix saturation bit offset in TPMEM (bsc#1111666).\n- hid: i2c-hid: Ignore input report if there\u0027s no data present on Elan touchpanels (bsc#1133486).\n- hid: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- hwmon: (core) add thermal sensors only if dev of_node is present (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- hwrng: virtio - Avoid repeated init of completion (bsc#1051510).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1133311).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: imx: correct the method of getting private data in notifier_call (bsc#1111666).\n- i2c: mlxcpld: Add support for extended transaction length for i2c-mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Add support for smbus block read transaction (bsc#1112374).\n- i2c: mlxcpld: Allow configurable adapter id for mlxcpld (bsc#1112374).\n- i2c: mlxcpld: Fix adapter functionality support callback (bsc#1112374).\n- i2c: mlxcpld: Fix wrong initialization order in probe (bsc#1112374).\n- i2c: mux: mlxcpld: simplify code to reach the adapter (bsc#1112374).\n- i2c: synquacer: fix enumeration of slave devices (bsc#1111666).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- ib/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Enable GRO (bsc#1132227).\n- ibmvnic: Fix completion structure initialization (bsc#1131659).\n- ibmvnic: Fix netdev feature clobbering during a reset (bsc#1132227).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- idr: fix overflow case for idr_for_each_entry_ul() (bsc#1109837).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bsc#1051510).\n- iio: Fix scan mask selection (bsc#1051510).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: ad_sigma_delta: select channel when reading register (bsc#1051510).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bsc#1051510).\n- iio: adc: fix warning in Qualcomm PM8xxx HK/XOADC driver (bsc#1051510).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: core: fix a possible circular locking dependency (bsc#1051510).\n- iio: cros_ec: Fix the maths for gyro scale calculation (bsc#1051510).\n- iio: dac: mcp4725: add missing powerdown bits in store eeprom (bsc#1051510).\n- iio: gyro: mpu3050: fix chip ID reading (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- io: accel: kxcjk1013: restore the range after resume (bsc#1051510).\n- iommu-helper: mark iommu_is_span_boundary as inline (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/amd: Set exclusion range correctly (bsc#1130425).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: Fix big-endian CMD_SYNC writes (bsc#1111666).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iov_iter: Fix build error without CONFIG_CRYPTO (bsc#1111666).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi: Prevent use-after-free in deliver_response (bsc#1111666).\n- ipmi: fix sleep-in-atomic in free_user at cleanup SRCU user release_barrier (bsc#1111666).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipv6: fib: Do not assume only nodes hold a reference on routes (bsc#1138732).\n- ipvlan: Add the skb mark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: cq/qp mask depends on bar2 pages in a host page (bsc#1127371).\n- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).\n- iwiwifi: fix bad monitor buffer register addresses (bsc#1129770).\n- iwlwifi: Fix double-free problems in iwl_req_fw_callback() (bsc#1111666).\n- iwlwifi: correct one of the PCI struct names (bsc#1111666).\n- iwlwifi: don\u0027t WARN when calling iwl_get_shared_mem_conf with RF-Kill (bsc#1111666).\n- iwlwifi: fix RF-Kill interrupt while FW load for gen2 devices (bsc#1111666).\n- iwlwifi: fix cfg structs for 22000 with different RF modules (bsc#1111666).\n- iwlwifi: fix devices with PCI Device ID 0x34F0 and 11ac RF modules (bsc#1111666).\n- iwlwifi: fix driver operation for 5350 (bsc#1111666).\n- iwlwifi: fix send hcmd timeout recovery flow (bsc#1129770).\n- iwlwifi: mvm: Drop large non sta frames (bsc#1111666).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- iwlwifi: pcie: don\u0027t service an interrupt that was masked (bsc#1111666).\n- iwlwifi: pcie: fix ALIVE interrupt handling for gen2 devices w/o MSI-X (bsc#1111666).\n- ixgbe: Avoid NULL pointer dereference with VF on non-IPsec hw (bsc#1140228).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI fix for hda_codec.relaxed_resume flag (bsc#1111666).\n- kABI workaround for asus-wmi changes (bsc#1051510).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kABI: protect functions using struct net_generic (bsc#1129845 LTC#176252).\n- kABI: protect struct smc_ib_device (bsc#1129845 LTC#176252).\n- kABI: protect struct smcd_dev (bsc#1129845 LTC#176252).\n- kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).\n- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).\n- kabi/severities: exclude hns3 symbols (bsc#1134948)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi: Fix lost iommu-helper symbols on arm64 (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: mask changes made by basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: mask changes made by use of DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kabi: remove unused hcall definition (bsc#1140322 LTC#176270).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kbuild: strip whitespace in cmd_record_mcount findstring (bsc#1065729).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kcm: switch order of device registration to fix a crash (bnc#1130527).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/padata.c: Make RT aware (SLE Realtime Extension (bnc#1135344)).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernfs: do not set dentry d_fsdata (boo#1133115).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- keys: safe concurrent user {session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest ibM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- kvm: Call kvm_arch_memslots_updated() before updating memslots (bsc#1132563).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: Fix kABI for AMD SMAP Errata workaround (bsc#1133149).\n- kvm: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- kvm: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation) (bsc#1133149).\n- kvm: VMX: Compare only a single byte for VMCS\u0027 \u0027launched\u0027 in vCPU-run (bsc#1132555).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- kvm: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm: nVMX: Apply addr size mask to effective address for VMX instructions (bsc#1132561).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: Ignore limit checks on VMX instructions using flat segments (bsc#1132564).\n- kvm: nVMX: Sign extend displacements of VMX instr\u0027s mem operands (bsc#1132562).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: polling: add architecture backend to disable polling (bsc#1119222).\n- kvm: s390: change default halt poll time to 50us (bsc#1119222).\n- kvm: s390: enable CONFIG_HAVE_kvm_NO_POLL (bsc#1119222) We need to enable CONFIG_HAVE_kvm_NO_POLL for bsc#1119222\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: fix typo in parameter description (bsc#1119222).\n- kvm: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- kvm: x86/mmu: Detect MMIO generation wrap in any address space (bsc#1132570).\n- kvm: x86/mmu: Do not cache MMIO accesses while memslots are in flux (bsc#1132571).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- kvm: x86: Report STibP on GET_SUPPORTED_CPUID (bsc#1111331).\n- kvm: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- kvm: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib/scatterlist: Fix mapping iterator when sg offset is greater than PAGE_SIZE (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- libceph, rbd, ceph: move ceph_osdc_alloc_messages() calls (bsc#1135897).\n- libceph, rbd: add error handling for osd_req_op_cls_init() (bsc#1135897). This feature was requested for SLE15 but aws reverted in packaging and master.\n- libceph: assign cookies in linger_submit() (bsc#1135897).\n- libceph: check reply num_data_items in setup_request_data() (bsc#1135897).\n- libceph: do not consume a ref on pagelist in ceph_msg_data_add_pagelist() (bsc#1135897).\n- libceph: enable fallback to ceph_msg_new() in ceph_msgpool_get() (bsc#1135897).\n- libceph: introduce alloc_watch_request() (bsc#1135897).\n- libceph: introduce ceph_pagelist_alloc() (bsc#1135897).\n- libceph: preallocate message data items (bsc#1135897).\n- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm/region: Register badblocks before namespaces (bsc#1143209).\n- lightnvm: if LUNs are already allocated fix return (bsc#1085535). \n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: Honor SW_CRYPTO_CONTROL for unicast keys in AP VLAN mode (bsc#1111666).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bsc#1051510).\n- mac80211: do not start any work during reconfigure flow (bsc#1111666).\n- mac80211: don\u0027t attempt to rename ERR_PTR() debugfs dirs (bsc#1111666).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix rate reporting inside cfg80211_calculate_bitrate_he() (bsc#1111666).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac80211: free peer keys before vif down in mesh (bsc#1111666).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- mac80211: mesh: fix RCU warning (bsc#1111666).\n- mac80211: only warn once on chanctx_conf being NULL (bsc#1111666).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: batch flush requests (bsc#1119680).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: mt9m111: set initial frame size other than 0x0 (bsc#1051510).\n- media: mtk-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg type in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev bitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mips: fix an off-by-one in dma_capable (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- mlxsw: core: Add API for QSFP module temperature thresholds reading (bsc#1112374).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for EMAD workqueue (bsc#1112374).\n- mlxsw: core: Move ethtool module callbacks to a common location (bsc#1112374).\n- mlxsw: core: Prevent reading unsupported slave address from SFP EEPROM (bsc#1112374).\n- mlxsw: core: mlxsw: core: avoid -Wint-in-bool-context warning (bsc#1112374).\n- mlxsw: pci: Reincrease PCI reset timeout (bsc#1112374).\n- mlxsw: reg: Add Management Temperature Bulk Register (bsc#1112374).\n- mlxsw: spectrum: Move QSFP EEPROM definitions to common location (bsc#1112374).\n- mlxsw: spectrum: Put MC TCs into DWRR mode (bsc#1112374).\n- mlxsw: spectrum_dcb: Configure DSCP map as the last rule is removed (bsc#1112374).\n- mlxsw: spectrum_flower: Fix TOS matching (bsc#1112374).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm/debug.c: fix __dump_page when mapping host is not set (bsc#1131934).\n- mm/devm_memremap_pages: introduce devm_memunmap_pages (bsc#1103992 FATE#326009).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm/page_isolation.c: fix a wrong flag in set_migratetype_isolate() (bsc#1131935).\n- mm/vmalloc: fix size check for remap_vmalloc_range_partial() (bsc#1133825).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: fix race on soft-offlining free huge pages (bsc#1139712). \n- mm: hugetlb: delete dequeue_hwpoisoned_huge_page() (bsc#1139712). \n- mm: hugetlb: prevent reuse of hwpoisoned free hugepages (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve source hugepage after successful migration (bsc#1139712). \n- mm: hugetlb: soft-offline: dissolve_free_huge_page() return zero on !PageHuge (bsc#bsc#1139712).\n- mm: hugetlb: soft_offline: save compound page order before page migration (bsc#1139712) \n- mm: hwpoison: change PageHWPoison behavior on hugetlb pages (bsc#1139712). \n- mm: hwpoison: dissolve in-use hugepage in unrecoverable memory error (bsc#1139712). \n- mm: hwpoison: introduce idenfity_page_state (bsc#1139712). \n- mm: hwpoison: introduce memory_failure_hugetlb() (bsc#1139712). \n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: soft-offline: close the race against page allocation (bsc#1139712). \n- mm: soft-offline: dissolve free hugepage if soft-offlined (bsc#1139712). \n- mm: soft-offline: return -EBUSY if set_hwpoison_free_buddy_page() fails (bsc#1139712). \n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: bcm2835 MMC issues (bsc#1070872).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: Fix tag set memory leak (bsc#1111666).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: complete HS400 before checking status (bsc#1111666).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: davinci: remove extraneous __init annotation (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc: sdhci: Fix data command CRC error handling (bsc#1051510).\n- mmc: sdhci: Handle auto-command errors (bsc#1051510).\n- mmc: sdhci: Rename SDHCI_ACMD12_ERR and SDHCI_INT_ACMD12ERR (bsc#1051510).\n- mmc: tmio_mmc_core: don\u0027t claim spurious interrupts (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mt7601u: bump supported EEPROM version (bsc#1051510).\n- mt7601u: do not schedule rx_tasklet when the device has been disconnected (bsc#1111666).\n- mt7601u: fix possible memory leak when the device is disconnected (bsc#1111666).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd name (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Make resume actually do something useful again on SDIO cards (bsc#1111666).\n- mwifiex: don\u0027t advertise IBSS features without FW support (bsc#1129770). \n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- net/af_iucv: build proper skbs for HiperTransport (bsc#1142221 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142221 LTC#179332).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/mlx5: Avoid reloading already removed devices (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, hold rcu read lock a bit longer (bsc#1103990 FATE#326006).\n- net/mlx5: FPGA, tls, idr remove on flow delete (bsc#1103990 FATE#326006).\n- net/mlx5: Set completion EQs as shared resources (bsc#1103991 FATE#326007).\n- net/mlx5: Update pci error handler entries and command translation (bsc#1103991 FATE#326007).\n- net/mlx5e: Fix ethtool rxfh commands when CONFIG_MLX5_EN_RXNFC is disabled (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix the max MTU check in case of XDP (bsc#1103990 FATE#326006).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: Fix use-after-free after xdp_return_frame (bsc#1103990 FATE#326006).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: Rx, Check ip headers sanity (bsc#1103990 FATE#326006).\n- net/mlx5e: Rx, Fix checksum calculation for new hardware (bsc#1127611).\n- net/mlx5e: Rx, Fixup skb checksum for packets with tail padding (bsc#1109837).\n- net/mlx5e: XDP, Fix shifted flag index in RQ bitmap (bsc#1103990 FATE#326006).\n- net/sched: cbs: Fix error path of cbs_module_init (bsc#1109837).\n- net/sched: cbs: fix port_rate miscalculation (bsc#1109837).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: don\u0027t dereference a goto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/smc: add pnet table namespace support (bsc#1129845 LTC#176252).\n- net/smc: add smcd support to the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pci IDs as ib device names in the pnet table (bsc#1129845 LTC#176252).\n- net/smc: allow pnetid-less configuration (bsc#1129845 LTC#176252).\n- net/smc: check for ip prefix and subnet (bsc#1134607 LTC#177518).\n- net/smc: cleanup for smcr_tx_sndbuf_nonempty (bsc#1129845 LTC#176252).\n- net/smc: cleanup of get vlan id (bsc#1134607 LTC#177518).\n- net/smc: code cleanup smc_listen_work (bsc#1134607 LTC#177518).\n- net/smc: consolidate function parameters (bsc#1134607 LTC#177518).\n- net/smc: fallback to TCP after connect problems (bsc#1134607 LTC#177518).\n- net/smc: fix a NULL pointer dereference (bsc#1134607 LTC#177518).\n- net/smc: fix return code from FLUSH command (bsc#1134607 LTC#177518).\n- net/smc: improve smc_conn_create reason codes (bsc#1134607 LTC#177518).\n- net/smc: improve smc_listen_work reason codes (bsc#1134607 LTC#177518).\n- net/smc: move unhash before release of clcsock (bsc#1134607 LTC#177518).\n- net/smc: nonblocking connect rework (bsc#1134607 LTC#177518).\n- net/smc: propagate file from SMC to TCP socket (bsc#1134607 LTC#177518).\n- net/smc: return booleans instead of integers (bsc#1096003, FATE#325023, LTC#164003).\n- net/smc: rework pnet table (bsc#1129845 LTC#176252).\n- net/smc: wait for pending work before clcsock release_sock (bsc#1134607 LTC#177518).\n- net/tls: avoid NULL pointer deref on nskb sk in fallback (bsc#1109837).\n- net/tls: avoid potential deadlock in tls_set_device_offload_rx() (bsc#1109837).\n- net/tls: don\u0027t copy negative amounts of data in reencrypt (bsc#1109837).\n- net/tls: don\u0027t ignore netdev notifications if no TLS features (bsc#1109837).\n- net/tls: don\u0027t leak IV and record seq when offload fails (bsc#1109837).\n- net/tls: don\u0027t leak partially sent record in device mode (bsc#1109837).\n- net/tls: fix build without CONFIG_TLS_DEVICE (bsc#1109837).\n- net/tls: fix copy to fragments in reencrypt (bsc#1109837).\n- net/tls: fix page double free on TX cleanup (bsc#1109837).\n- net/tls: fix refcount adjustment in fallback (bsc#1109837).\n- net/tls: fix socket wmem accounting on fallback with netem (bsc#1109837).\n- net/tls: fix state removal with feature flags off (bsc#1109837).\n- net/tls: fix the IV leaks (bsc#1109837).\n- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).\n- net/tls: make sure offload also gets the keys wiped (bsc#1109837).\n- net/tls: prevent bad memory access in tls_is_sk_tx_device_offloaded() (bsc#1109837).\n- net/tls: replace the sleeping lock around RX resync with a bit lock (bsc#1109837).\n- net/udp_gso: Allow TX timestamp with UDP GSO (bsc#1109837).\n- net: Fix missing meta data in skb with vlan packet (bsc#1109837).\n- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).\n- net: core: support XDP generic on stacked devices (bsc#1109837).\n- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).\n- net: don\u0027t clear sock sk early to avoid trouble in strparser (bsc#1103990 FATE#326006).\n- net: ena: Fix bug where ring allocation backoff stopped too late (bsc#1138879).\n- net: ena: add MAX_QUEUES_EXT get feature admin command (bsc#1138879).\n- net: ena: add ethtool function for changing io queue sizes (bsc#1138879).\n- net: ena: add good checksum counter (bsc#1138879).\n- net: ena: add handling of llq max tx burst size (bsc#1138879).\n- net: ena: add newline at the end of pr_err prints (bsc#1138879).\n- net: ena: add support for changing max_header_size in LLQ mode (bsc#1138879).\n- net: ena: allow automatic fallback to polling mode (bsc#1138879).\n- net: ena: allow queue allocation backoff when low on memory (bsc#1138879).\n- net: ena: arrange ena_probe() function variables in reverse christmas tree (bsc#1138879).\n- net: ena: enable negotiating larger Rx ring size (bsc#1138879).\n- net: ena: ethtool: add extra properties retrieval via get_priv_flags (bsc#1138879).\n- net: ena: fix ena_com_fill_hash_function() implementation (bsc#1138879).\n- net: ena: fix incorrect test of supported hash function (bsc#1138879).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ena: fix swapped parameters when calling ena_com_indirect_table_fill_entry (bsc#1138879).\n- net: ena: fix: Free napi resources when ena_up() fails (bsc#1138879).\n- net: ena: fix: set freed objects to NULL to avoid failing future allocations (bsc#1138879).\n- net: ena: gcc 8: fix compilation warning (bsc#1138879).\n- net: ena: improve latency by disabling adaptive interrupt moderation by default (bsc#1138879).\n- net: ena: make ethtool show correct current and max queue sizes (bsc#1138879).\n- net: ena: optimise calculations for CQ doorbell (bsc#1138879).\n- net: ena: remove inline keyword from functions in *.c (bsc#1138879).\n- net: ena: replace free_tx/rx_ids union with single free_ids field in ena_ring (bsc#1138879).\n- net: ena: update driver version from 2.0.3 to 2.1.0 (bsc#1138879).\n- net: ena: use dev_info_once instead of static variable (bsc#1138879).\n- net: ethernet: ti: cpsw_ethtool: fix ethtool ring param set (bsc#1130836).\n- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).\n- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).\n- net: hns3: Fix inconsistent indenting (bsc#1140676).\n- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).\n- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).\n- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).\n- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).\n- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).\n- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: add queue\u0027s statistics update to service task (bsc#1104353 bsc#1134981).\n- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).\n- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).\n- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).\n- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).\n- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).\n- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).\n- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).\n- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).\n- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).\n- net: hns3: code optimization for command queue\u0027 spin lock (bsc#1104353 bsc#1135042).\n- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).\n- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).\n- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).\n- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).\n- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).\n- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).\n- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix data race between ring next_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).\n- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).\n- net: hns3: fix for vport bw_limit overflow problem (bsc#1104353 bsc#1134998).\n- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).\n- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).\n- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).\n- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).\n- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).\n- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).\n- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).\n- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).\n- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).\n- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).\n- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).\n- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).\n- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).\n- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).\n- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).\n- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).\n- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).\n- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).\n- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).\n- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).\n- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).\n- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).\n- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).\n- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).\n- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).\n- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).\n- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).\n- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).\n- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).\n- net: hns3: use atomic_t replace u32 for arq\u0027s count (bsc#1104353 bsc#1134953).\n- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).\n- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bsc#1140676).\n- net: hns: Fix loopback test failed at copper ports (bsc#1140676).\n- net: hns: Fix probabilistic memory overwrite when HNS driver initialized (bsc#1140676).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bsc#1140676).\n- net: hns: fix ICMP6 neighbor solicitation messages discard problem (bsc#1140676).\n- net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw() (bsc#1140676).\n- net: hns: fix unsigned comparison to less than zero (bsc#1140676).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: phy: marvell10g: report if the PHY fails to boot firmware (bsc#1119113 FATE#326472).\n- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).\n- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).\n- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).\n- net: smc_close: mark expected switch fall-through (bsc#1096003, FATE#325023, LTC#164003).\n- net: tls, correctly account for copied bytes with multiple sk_msgs (bsc#1109837).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- new primitive: vmemdup_user() (jsc#SLE-4712 bsc#1136156).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfp: bpf: fix static check error through tightening shift amount adjustment (bsc#1109837).\n- nfp: flower: add rcu locks when accessing netdev for tunnels (bsc#1109837).\n- nfs: Fix dentry revalidation on nfsv4 lookup (bsc#1132618).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nl80211: fix station_info pertid memory leak (bsc#1051510).\n- nvme-fc: use separate work queue to avoid warning (bsc#1131673).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1130937).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-multipath: split bios with the ns_head bio_set before submitting (bsc#1103259, bsc#1131673).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: add proper discard setup for the multipath device (bsc#1114638).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvme: fix the dangerous reference of namespaces list (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvme: make sure ns head inherits underlying device limits (bsc#1131673).\n- nvme: only reconfigure discard if necessary (bsc#1114638).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- overflow: Fix -Wtype-limits compilation warnings (bsc#1111666).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- p54usb: Fix race between disconnect and firmware loading (bsc#1111666).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- pci / PM: Use SMART_SUSPEND and LEAVE_SUSPENDED flags for PCIe ports (bsc#1142623).\n- pci/aer: Use cached AER Capability offset (bsc#1142623).\n- pci/p2pdma: Fix missing check for dma_virt_ops (bsc#1111666).\n- pci/portdrv: Add #defines for AER and DPC Interrupt Message Number masks (bsc#1142623).\n- pci/portdrv: Consolidate comments (bsc#1142623).\n- pci/portdrv: Disable port driver in compat mode (bsc#1142623).\n- pci/portdrv: Remove pcie_portdrv_err_handler.slot_reset (bsc#1142623).\n- pci/portdrv: Support PCIe services on subtractive decode bridges (bsc#1142623).\n- pci/portdrv: Use conventional Device ID table formatting (bsc#1142623).\n- pci: Init PCIe feature bits for managed host bridge alloc (bsc#1111666).\n- pci: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- pci: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- pci: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- pci: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- pci: hv: Remove unused reason for refcount handler (bsc#1142701).\n- pci: hv: support reporting serial number as slot information (bsc#1142701).\n- pci: pciehp: Convert to threaded IRQ (bsc#1133005).\n- pci: pciehp: Ignore Link State Changes after powering off a slot (bsc#1133005).\n- pci: pciehp: Tolerate Presence Detect hardwired to zero (bsc#1133016).\n- pci: portdrv: Restore PCI config state on slot reset (bsc#1142623).\n- perf/x86/amd: Add event map for AMD Family 17h (bsc#1134223).\n- perf/x86/amd: Update generic hardware cache events for Family 17h (bsc#1134223).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- phy: sun4i-usb: Support set_mode to USB_HOST for non-OTG PHYs (bsc#1051510).\n- pinctrl/amd: add get_direction handler (bsc#1140463).\n- pinctrl/amd: fix gpio irq level in debugfs (bsc#1140463).\n- pinctrl/amd: fix masking of GPIO interrupts (bsc#1140463).\n- pinctrl/amd: make functions amd_gpio_suspend and amd_gpio_resume static (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in amd_gpio_irq_set_type (bsc#1140463).\n- pinctrl/amd: poll InterruptEnable bits in enable_irq (bsc#1140463).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: Add TmFifo driver for Mellanox BlueField Soc (bsc#1136333 jsc#SLE-4994).\n- platform/mellanox: Add new ODM system types to mlx-platform (bsc#1112374).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: mlx-platform: Add ASIC hotplug device configuration (bsc#1112374).\n- platform/x86: mlx-platform: Add LED platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add UID LED for the next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add definitions for new registers (bsc#1112374).\n- platform/x86: mlx-platform: Add extra CPLD for next generation systems (bsc#1112374).\n- platform/x86: mlx-platform: Add mlx-wdt platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-fan platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add mlxreg-io platform driver activation (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan capability registers (bsc#1112374).\n- platform/x86: mlx-platform: Add support for fan direction register (bsc#1112374).\n- platform/x86: mlx-platform: Add support for new VMOD0007 board name (bsc#1112374).\n- platform/x86: mlx-platform: Add support for tachometer speed register (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for more systems (bsc#1112374).\n- platform/x86: mlx-platform: Allow mlxreg-io driver activation for new systems (bsc#1112374).\n- platform/x86: mlx-platform: Change mlxreg-io configuration for MSN274x systems (bsc#1112374).\n- platform/x86: mlx-platform: Convert to use SPDX identifier (bsc#1112374).\n- platform/x86: mlx-platform: Fix LED configuration (bsc#1112374).\n- platform/x86: mlx-platform: Fix access mode for fan_dir attribute (bsc#1112374).\n- platform/x86: mlx-platform: Fix copy-paste error in mlxplat_init() (bsc#1112374).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: mlx-platform: Fix tachometer registers (bsc#1112374).\n- platform/x86: mlx-platform: Remove unused define (bsc#1112374).\n- platform/x86: mlx-platform: Rename new systems product names (bsc#1112374).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- platform_data/mlxreg: Add capability field to core platform data (bsc#1112374).\n- platform_data/mlxreg: Document fixes for core platform data (bsc#1112374).\n- platform_data/mlxreg: additions for Mellanox watchdog driver (bsc#1112374).\n- pm: acpi/PCI: Resume all devices during hibernation (bsc#1111666).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- powerpc/64s: Fix logic when handling unknown CPU features (bsc#1055117).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/hugetlb: Handle mmap_min_addr correctly in get_unmapped_area callback (bsc#1131900).\n- powerpc/kvm: Save and restore host AMR/IAMR/UAMOR (bsc#1061840).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm/hash: Handle mmap_min_addr correctly in get_unmapped_area topdown search (bsc#1131900).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, fate#323286, git-fixes).\n- powerpc/mm: Add missing tracepoint for tlbie (bsc#1055117, git-fixes).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Check secondary hash page table (bsc#1065729).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, fate#323286, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/numa: document topology_updates_enabled, disable by default (bsc#1133584).\n- powerpc/numa: improve control of topology updates (bsc#1133584).\n- powerpc/papr_scm: Force a scm-unbind if initial scm-bind fails (bsc#1140322 LTC#176270).\n- powerpc/papr_scm: Update drc_pmem_unbind() to use H_SCM_UNBIND_ALL (bsc#1140322 LTC#176270).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/perf: Fix unit_sel/cache_sel checks (bsc#1053043).\n- powerpc/perf: Remove l2 bus events from HW cache event array (bsc#1053043).\n- powerpc/powernv/cpuidle: Init all present cpus for deep states (bsc#1055121).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/powernv/ioda2: Remove redundant free of TCE pages (bsc#1061840).\n- powerpc/powernv/ioda: Allocate indirect TCE levels of cached userspace addresses on demand (bsc#1061840).\n- powerpc/powernv/ioda: Fix locked_vm counting for memory used by IOMMU tables (bsc#1061840).\n- powerpc/powernv: Don\u0027t reprogram SLW image on every KVM guest entry/exit (bsc#1061840).\n- powerpc/powernv: Make opal log only readable by root (bsc#1065729).\n- powerpc/powernv: Remove never used pnv_power9_force_smt4 (bsc#1061840).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries: Update SCM hcall op-codes in hvcall.h (bsc#1140322 LTC#176270).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- powerpc64/ftrace: Include ftrace.h needed for enable/disable calls (bsc#1088804, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix 32-bit KVM-PR lockup and host crash with MacOS guest (bsc#1061840).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc: avoid -mno-sched-epilog on GCC 4.9 and newer (bsc#1065729).\n- powerpc: consolidate -mno-sched-epilog into FTRACE flags (bsc#1065729).\n- ppc: Convert mmu context allocation to new IDA API (bsc#1139619 LTC#178538).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- proc/kcore: don\u0027t bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Don\u0027t disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: stm32: Use 3 cells of_xlate() (bsc#1111666).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid pci errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedi: Use hwfns and affin_hwfn_idx to get MSI-X vector index (jsc#SLE-4693 bsc#1136462).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128971).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).\n- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027cur_rings, max_hw_rings, tx_desc_info\u0027 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027op, cmd_op\u0027 (bsc#1136469 jsc#SLE-4695).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rbd: do not assert on writes to snapshots (bsc#1137985 bsc#1138681).\n- rdma/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Add support for 64Byte cqes (bsc#1127371).\n- rdma/cxgb4: Add support for kernel mode SRQ\u0027s (bsc#1127371).\n- rdma/cxgb4: Add support for srq functions and structs (bsc#1127371).\n- rdma/cxgb4: Don\u0027t expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Fix spelling mistake \u0027immedate\u0027 \u0027immediate\u0027 (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Make c4iw_poll_cq_one() easier to analyze (bsc#1127371).\n- rdma/cxgb4: Remove a set-but-not-used variable (bsc#1127371).\n- rdma/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- rdma/cxgb4: fix some info leaks (bsc#1127371).\n- rdma/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).\n- rdma/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).\n- rdma/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).\n- rdma/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).\n- rdma/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).\n- rdma/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).\n- rdma/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).\n- rdma/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the chip hanging caused by sending mailbox CMQ during reset (bsc#1104427 bsc#1137232).\n- rdma/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).\n- rdma/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).\n- rdma/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).\n- rdma/hns: Make some function static (bsc#1104427 bsc#1126206).\n- rdma/hns: Modify qp specification according to UM (bsc#1104427 bsc#1137233).\n- rdma/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).\n- rdma/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).\n- rdma/hns: Remove set but not used variable \u0027rst\u0027 (bsc#1104427 bsc#1126206).\n- rdma/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).\n- rdma/hns: Update CQE specifications (bsc#1104427 bsc#1137236).\n- rdma/hns: rdma/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).\n- rdma/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).\n- rdma/iw_cxgb4: Drop __GFP_NOFAIL (bsc#1127371).\n- rdma/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).\n- rdma/qedr: Fix incorrect device rate (bsc#1136188).\n- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).\n- rdma/smc: Replace ib_query_gid with rdma_get_gid_attr (bsc#1131530 LTC#176717).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- ring-buffer: Check if memory is available before allocation (bsc#1132531).\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).\n- rtlwifi: rtl8192cu: fix error handle when usb probe failed (bsc#1111666).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/airq: use DMA memory for adapter interrupts (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: add basic protected virtualization support (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cio: introduce DMA pools to cio (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/cpumf: Add extended counter set definitions for model 8561 and 8562 (bsc#1142052 LTC#179320).\n- s390/dasd: fix panic for failed online processing (bsc#1132589).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/dma: provide proper ARCH_ZONE_DMA_BITS value (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/mm: force swiotlb for protected virtualization (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/pkey: move pckmo subfunction available checks away from module init (bsc#1128544).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- s390/qdio: handle PENDING state for QEBSM devices (bsc#1142119 LTC#179331).\n- s390/qeth: be drop monitor friendly (bsc#1142115 LTC#179337).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- s390/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178). \n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 FATE#327003 bsc#1135153 LTC#173151).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- s390: enable processes for mio instructions (jsc#SLE-5802 FATE#327055 bsc#1134738 LTC#173387).\n- s390: remove the unused dma_capable helper (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 FATE#327042 bsc#1134730 LTC#173388).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi/fc: kABI fixes for new ELS_FPIN definition (bsc#1136217,jsc#SLE-4722).\n- scsi: aacraid: Mark expected switch fall-through (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: Mark expected switch fall-throughs (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change event_wait to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: change wait_sem to a completion (jsc#SLE-4710 bsc#1136161).\n- scsi: aacraid: clean up some indentation and formatting issues (jsc#SLE-4710 bsc#1136161).\n- scsi: be2iscsi: be_iscsi: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: be_main: Mark expected switch fall-through (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: fix spelling mistake \u0027Retreiving\u0027 \u0027Retrieving\u0027 (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: lpfc: fix typo (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: remove unused variable dmsg (jsc#SLE-4721 bsc#1136264).\n- scsi: be2iscsi: switch to generic DMA API (jsc#SLE-4721 bsc#1136264).\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: csiostor: Remove set but not used variable \u0027pln\u0027 (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: csio_wr: mark expected switch fall-through (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: drop serial_number usage (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix NULL pointer dereference in csio_vport_set_state() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix calls to dma_set_mask_and_coherent() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix incorrect dma device in case of vport (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (jsc#SLE-4679 bsc#1136343).\n- scsi: csiostor: no need to check return value of debugfs_create functions (jsc#SLE-4679 bsc#1136343).\n- scsi: cxgb4i: add wait_for_completion() (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: KABI: fix handle completion etc (jsc#SLE-4678 bsc#1136342).\n- scsi: cxgbi: remove redundant __kfree_skb call on skb and free cst atid (jsc#SLE-4678 bsc#1136342).\n- scsi: fc: add FPIN ELS definition (bsc#1136217,jsc#SLE-4722).\n- scsi: hisi: KABI ignore new symbols (bsc#1135038).\n- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).\n- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).\n- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).\n- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).\n- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).\n- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).\n- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).\n- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).\n- scsi: hisi_sas: add host reset interface for test (bsc#1135041).\n- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).\n- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).\n- scsi: hpsa: Use vmemdup_user to replace the open code (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: bump driver version (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: check for lv removal (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: clean up two indentation issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device id issues (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct device resets (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct ioaccel2 chaining (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: correct simple mode (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: fix an uninitialized read and dereference of pointer dev (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: mark expected switch fall-throughs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: remove timeout from TURs (jsc#SLE-4712 bsc#1136156).\n- scsi: hpsa: switch to generic DMA API (jsc#SLE-4712 bsc#1136156).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).\n- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).\n- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).\n- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).\n- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).\n- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).\n- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).\n- scsi: libsas: allocate sense buffer for bsg queue (bsc#1131467).\n- scsi: lpfc: Add loopback testing to trunking mode (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Annotate switch/case fall-through (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Cancel queued work for an IO when processing a received ABTS (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Change smp_processor_id() into raw_smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Convert bootstrap mbx polling from msleep to udelay (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Coordinate adapter error handling with offline handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct __lpfc_sli_issue_iocb_s4 lockdep check (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct boot bios information to FDMI registration (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct localport timeout duration error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Correct nvmet buffer free race condition (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Declare local functions static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Enhance 6072 log string (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix BFS crash with DIX enabled (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI fc4type for nvme support (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix FDMI manufacturer attribute value (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix HDMI2 registration string for symbolic name (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix PT2PT PLOGI collison stopping discovery (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix SLI3 commands being issued on SLI4 devices (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix a recently introduced compiler warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix alloc context on oas lun creations (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix build error (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix deadlock due to nested hbalock call (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix driver crash in target reset handler (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix duplicate log message numbers (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error code if kcalloc() fails (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix error codes in lpfc_sli4_pci_mem_setup() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fc4type information for FDMI (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix fcp_rsp_len checking on lun reset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix handling of trunk links state reporting (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix hardlockup in scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix incorrect logical link speed on trunks when links down (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix indentation and balance braces (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix io lost on host resets (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix kernel warnings related to smp_processor_id() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix link speed reporting for 4-link trunk (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix location of SCSI ktime counters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix lpfc_nvmet_mrq attribute handling when 0 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix mailbox hang on adapter init (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix memory leak in abnormal exit path from lpfc_eq_create (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix missing wakeups on abort threads (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet async receive buffer replenishment (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of first burst cmd (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet handling of received ABTS for unmapped frames (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix nvmet target abort cmd matching (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix oops when driver is loaded with 1 interrupt vector (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix poor use of hardware queues if fewer irq vectors (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix protocol support on G6 and G7 adapters (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fix use-after-free mailbox cmd completion (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Fixup eq_clr_intr references (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Make lpfc_sli4_oas_verify static (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Move trunk_errmsg[] from a header file into a .c file (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Prevent \u0027use after free\u0027 memory overwrite in nvmet LS handling (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Reduce memory footprint for lpfc_queue (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set but not used variable \u0027phys_id\u0027 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove set-but-not-used variables (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Remove unused functions (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve inconsistent check of hdwq in lpfc_scsi_cmd_iocb_cmpl (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Resolve irq-unsafe lockdep heirarchy warning in lpfc_io_free (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revert message logging on unsupported topology (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Revise message when stuck due to unresponsive adapter (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Rework misleading nvme not supported in firmware message (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Separate CQ processing for nvmet_fc upcalls (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Specify node affinity for queue memory allocation (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Stop adapter if pci errors detected (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update Copyright in driver version (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.1 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: Update lpfc version to 12.2.0.3 (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: add support for posting FC events on FPIN reception (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: avoid uninitialized variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix 32-bit format string warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix a handful of indentation issues (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix calls to dma_set_mask_and_coherent() (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: fix unused variable warning (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: resolve static checker warning in lpfc_sli4_hba_unset (bsc#1136217,jsc#SLE-4722).\n- scsi: lpfc: use dma_set_mask_and_coherent (bsc#1136217,jsc#SLE-4722).\n- scsi: megaraid_sas: Add support for DEVICE_LIST DCMD in driver (bsc#1136271).\n- scsi: megaraid_sas: Retry reads of outbound_intr_status reg (bsc#1136271).\n- scsi: megaraid_sas: Rework code to get PD and LD list (bsc#1136271).\n- scsi: megaraid_sas: Rework device add code in AEN path (bsc#1136271).\n- scsi: megaraid_sas: Update structures for HOST_DEVICE_LIST DCMD (bsc#1136271).\n- scsi: megaraid_sas: correct an info message (bsc#1136271).\n- scsi: megaraid_sas: driver version update (bsc#1136271).\n- scsi: mpt3sas: Add Atomic RequestDescriptor support on Aero (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add flag high_iops_queues (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add missing breaks in switch statements (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for ATLAS PCIe switch (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Add support for NVMe Switch Adapter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Affinity high iops queues IRQs to local node (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Enable interrupt coalescing on high iops (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix kernel panic during expander reset (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Fix typo in request_desript_type (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Improve the threshold value and introduce module param (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Introduce perf_mode module parameter (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Irq poll to avoid CPU hard lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Load balance to improve performance and avoid soft lockups (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Rename mpi endpoint device ID macro (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 27.102.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update driver version to 29.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Update mpt3sas driver version to 28.100.00.00 (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: Use high iops queues under some circumstances (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: change _base_get_msix_index prototype (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: fix indentation issue (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: function pointers of request descriptor (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: save and use MSI-X index for posting RD (bsc#1125703,jsc#SLE-4717).\n- scsi: mpt3sas: simplify interrupt handler (bsc#1125703,jsc#SLE-4717).\n- scsi: qedf: Add LBA to underrun debug messages (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add a flag to help debugging io_req which could not be cleaned (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add additional checks for io_req sc_cmd validity (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add comment to display logging levels (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add driver state to \u0027driver_stats\u0027 debugfs node (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_post_io_req() in the fcport offload check (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add missing return in qedf_scsi_done() (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add port_id for fcport into initiate_cleanup debug message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Add return value to log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Change MSI-X load error message (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for fcoe_libfc_config failure (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check for tm_flags instead of cmd_type during cleanup (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Check the return value of start_xmit (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Cleanup rrq_work after QEDF_CMD_OUTSTANDING is cleared (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Correctly handle refcounting of rdata (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not queue anything if upload is in progress (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Do not send ABTS for under run scenario (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Fix lport may be used uninitialized warning (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Log message if scsi_add_host fails (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Modify flush routine to handle all I/Os and TMF (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print fcport information on wait for upload timeout (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Print scsi_cmd backpointer in good completion path if the command is still being used (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Remove set but not used variable \u0027fr_len\u0027 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.19 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: Wait for upload and link down processing during soft ctx reset (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qedf: remove memset/memcpy to nfunc and use func instead (bsc#1136467 jsc#SLE-4694).\n- scsi: qedf: remove set but not used variables (bsc#1136467 jsc#SLE-4694).\n- scsi: qedi: Add packet filter in light L2 Rx path (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Check for session online before getting iSCSI TLV data (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Cleanup redundant QEDI_PAGE_SIZE macro definition (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Fix spelling mistake \u0027OUSTANDING\u0027 \u0027OUTSTANDING\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Move LL2 producer index processing in BH (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Replace PAGE_SIZE with QEDI_PAGE_SIZE (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: Update driver version to 8.33.0.21 (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: add module param to set ping packet size (jsc#SLE-4693 bsc#1136462).\n- scsi: qedi: remove set but not used variables \u0027cdev\u0027 and \u0027udev\u0027 (jsc#SLE-4693 bsc#1136462).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).\n- scsi: qla2xxx: Avoid pci IRQ affinity mapping when multiqueue is not supported (bsc#1136215).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).\n- scsi: qla2xxx: Remove FW default template (bsc#1136215).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: avoid printf format warning (bsc#1136215).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).\n- scsi: qla2xxx: do not crash on uninitialized pool list (boo#1138874).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 - \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: scsi_transport_fc: Add FPIN fc event codes (bsc#1136217,jsc#SLE-4722).\n- scsi: scsi_transport_fc: refactor event posting routines (bsc#1136217,jsc#SLE-4722).\n- scsi: smartpqi: Add retries for device reset (bsc#1133547).\n- scsi: smartpqi: Reporting \u0027logical unit failure\u0027 (bsc#1133547).\n- scsi: smartpqi: add H3C controller IDs (bsc#1133547).\n- scsi: smartpqi: add h3c ssid (bsc#1133547).\n- scsi: smartpqi: add no_write_same for logical volumes (bsc#1133547).\n- scsi: smartpqi: add ofa support (bsc#1133547).\n- scsi: smartpqi: add smp_utils support (bsc#1133547).\n- scsi: smartpqi: add spdx (bsc#1133547).\n- scsi: smartpqi: add support for PQI Config Table handshake (bsc#1133547).\n- scsi: smartpqi: add support for huawei controllers (bsc#1133547).\n- scsi: smartpqi: add sysfs attributes (bsc#1133547).\n- scsi: smartpqi: allow for larger raid maps (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: bump driver version (bsc#1133547).\n- scsi: smartpqi: call pqi_free_interrupts() in pqi_shutdown() (bsc#1133547).\n- scsi: smartpqi: check for null device pointers (bsc#1133547).\n- scsi: smartpqi: correct host serial num for ssa (bsc#1133547).\n- scsi: smartpqi: correct lun reset issues (bsc#1133547).\n- scsi: smartpqi: correct volume status (bsc#1133547).\n- scsi: smartpqi: do not offline disks for transient did no connect conditions (bsc#1133547).\n- scsi: smartpqi: enhance numa node detection (bsc#1133547).\n- scsi: smartpqi: fix build warnings (bsc#1133547).\n- scsi: smartpqi: fix disk name mount point (bsc#1133547).\n- scsi: smartpqi: fully convert to the generic DMA API (bsc#1133547).\n- scsi: smartpqi: increase LUN reset timeout (bsc#1133547).\n- scsi: smartpqi: increase fw status register read timeout (bsc#1133547).\n- scsi: smartpqi: refactor sending controller raid requests (bsc#1133547).\n- scsi: smartpqi: turn off lun data caching for ptraid (bsc#1133547).\n- scsi: smartpqi: update copyright (bsc#1133547).\n- scsi: smartpqi: update driver version (bsc#1133547).\n- scsi: smartpqi: wake up drives after os resumes from suspend (bsc#1133547).\n- scsi: smartpqi_init: fix boolean expression in pqi_device_remove_start (bsc#1133547).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: fuse: Fix illegal free of IO base address (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi-mem: fix kernel-doc for spi_mem_dirmap_{read|write}() (bsc#1111666).\n- spi: Add missing pm_runtime_put_noidle() after failed get (bsc#1111666).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bsc#1051510).\n- staging: comedi: vmk80xx: Fix possible double-free of usb_rx_buf (bsc#1051510).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bsc#1051510).\n- staging: iio: ad7192: Fix ad7193 channel address (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- staging: rtl8712: uninitialized memory in read_bbreg_hdl() (bsc#1051510).\n- staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc (bsc#1111666).\n- staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference (bsc#1111666).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: vt6655: Fix interrupt race condition on device start up (bsc#1051510). \n- staging: vt6655: Remove vif check from vnt_interrupt (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- supported.conf: added mlxbf_tmfifo (bsc#1136333 jsc#SLE-4994)\n- supported.conf: dw_mmc-bluefield is not needed in kernel-default-base (bsc#1131574).\n- svm/avic: Fix invalidate logical APIC id entry (bsc#1132726).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC DFR and LDR handling (bsc#1132558).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow for file-max (bsc#1051510).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: fix tcp_set_congestion_control() use from bpf hook (bsc#1109837).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- testing: nvdimm: provide SZ_4G constant (bsc#1132982).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools: bpftool: Fix json dump crash on powerpc (bsc#1109837).\n- tools: bpftool: fix infinite loop in map create (bsc#1109837).\n- tools: bpftool: use correct argument in cgroup errors (bsc#1109837).\n- tpm: Fix the type of the return value in calc_tpm2_event_size() (bsc#1082555).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bsc#1132527).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- tracing: Fix a memory leak by early error exit in trace_pid_write() (bsc#1133702).\n- tracing: Fix buffer_ref pipe ops (bsc#1133698).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty: serial_core, add install (bnc#1129693).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: f_fs: Avoid crash due to out-of-scope stack ptr access (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300 ep[i] (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: allow dedupe of user owned read-only files (bsc#1133778, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: avoid problematic remapping requests into partial EOF block (bsc#1133850, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe should return EPERM if permission is not granted (bsc#1133779, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: dedupe: extract helper for a single dedup (bsc#1133769, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: exit early from zero length remap operations (bsc#1132411, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: export vfs_dedupe_file_range_one() to modules (bsc#1133772, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: limit size of dedupe (bsc#1132397, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: rename clone_verify_area to remap_verify_area (bsc#1133852, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: skip zero-length dedupe requests (bsc#1133851, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: swap names of {do,vfs}_clone_file_range() (bsc#1133774, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vfs: vfs_clone_file_prep_inodes should return EINVAL for a clone from beyond EOF (bsc#1133780, bsc#1132219).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio/s390: DMA support for virtio-ccw (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: add indirection to indicators access (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: make airq summary indicators DMA (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use DMA memory for ccw I/O and classic notifiers (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use cacheline aligned airq bit vectors (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio/s390: use vring_create_virtqueue (jsc#SLE-6197 bsc#1140559 LTC#173150).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: check null pointer in _wil_cfg80211_merge_extra_ies (bsc#1051510).\n- wil6210: drop old event after wmi_call timeout (bsc#1111666).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).\n- wil6210: fix spurious interrupts in 3-msi (bsc#1111666).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bsc#1051510).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/MCE/AMD, EDAC/mce_amd: Add new MP5, NBIO, and pciE SMCA bank types (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new McaTypes for CS, PSP, and SMU units (bsc#1128415).\n- x86/MCE/AMD, EDAC/mce_amd: Add new error descriptions for some SMCA bank types (bsc#1128415).\n- x86/MCE: Fix kABI for new AMD bank names (bsc#1128415).\n- x86/PCI: Fixup RTIT_BAR of Intel Denverton Trace Hub (bsc#1120318). \n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init (bsc#1132572).\n- x86/mce/AMD, EDAC/mce_amd: Enumerate Reserved SMCA bank type (bsc#1128415).\n- x86/mce/AMD: Pass the bank number to smca_get_bank_type() (bsc#1128415).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/mce: Handle varying MCA bank counts (bsc#1128415).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/perf/amd: Remove need to check \u0027running\u0027 bit in NMI handler (bsc#1131438).\n- x86/perf/amd: Resolve NMI latency issues for active PMCs (bsc#1131438).\n- x86/perf/amd: Resolve race condition when disabling PMC (bsc#1131438).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Prevent deadlock on ssb_state::lock (bsc#1114279).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1112178).\n- x86/tsc: Force inlining of cyc2ns bits (bsc#1052904).\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xdp: check device pointer before clearing (bsc#1109837).\n- xdp: fix possible cq entry leak (bsc#1109837).\n- xdp: fix race on generic receive path (bsc#1109837).\n- xdp: hold device for umem regardless of zero-copy mode (bsc#1109837).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xen: Prevent buffer overflow in privcmd ioctl (bsc#1065600).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: add the ability to join a held buffer to a defer_ops (bsc#1133674).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: allow xfs_lock_two_inodes to take different EXCL/SHARED modes (bsc#1132370, bsc#1132219).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: call xfs_qm_dqattach before performing reflink operations (bsc#1132368, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: cap the length of deduplication requests (bsc#1132373, bsc#1132219).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: clean up xfs_reflink_remap_blocks call site (bsc#1132413, bsc#1132219).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: do not overflow xattr listent buffer (bsc#1143105).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned dedupe ranges (bsc#1132405, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix data corruption w/ unaligned reflink ranges (bsc#1132407, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix pagecache truncation prior to reflink (bsc#1132412, bsc#1132219).\n- xfs: fix reporting supported extra file attributes for statx() (bsc#1133529).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: flush removing page cache in xfs_reflink_remap_prep (bsc#1132414, bsc#1132219).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: hold xfs_buf locked between shortform leaf conversion and the addition of an attribute (bsc#1133675).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: only grab shared inode locks for source file during reflink (bsc#1132372, bsc#1132219).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor clonerange preparation into a separate helper (bsc#1132402, bsc#1132219).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: refactor xfs_trans_roll (bsc#1133667).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink find shared should take a transaction (bsc#1132226, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: reflink should break pnfs leases before sharing blocks (bsc#1132369, bsc#1132219).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove dest file\u0027s post-eof preallocations before reflinking (bsc#1132365, bsc#1132219).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove the ip argument to xfs_defer_finish (bsc#1133672).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: rename xfs_defer_join to xfs_defer_ijoin (bsc#1133668).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: update ctime and remove suid before cloning files (bsc#1132404, bsc#1132219).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xfs: zero posteof blocks when cloning above eof (bsc#1132403, bsc#1132219).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xprtrdma: Fix use-after-free in rpcrdma_post_recvs (bsc#1103992 FATE#326009).\n- xsk: Properly terminate assignment in xskq_produce_flush_desc (bsc#1109837).\n- {nl,mac}80211: allow 4addr AP operation on crypto controlled devices (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2430,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2430,SUSE-SLE-Module-RT-15-SP1-2019-2430",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2430-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2430-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2430-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1050549",
"url": "https://bugzilla.suse.com/1050549"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1052904",
"url": "https://bugzilla.suse.com/1052904"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1055121",
"url": "https://bugzilla.suse.com/1055121"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1070872",
"url": "https://bugzilla.suse.com/1070872"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083710",
"url": "https://bugzilla.suse.com/1083710"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1085536",
"url": "https://bugzilla.suse.com/1085536"
},
{
"category": "self",
"summary": "SUSE Bug 1088047",
"url": "https://bugzilla.suse.com/1088047"
},
{
"category": "self",
"summary": "SUSE Bug 1088804",
"url": "https://bugzilla.suse.com/1088804"
},
{
"category": "self",
"summary": "SUSE Bug 1093389",
"url": "https://bugzilla.suse.com/1093389"
},
{
"category": "self",
"summary": "SUSE Bug 1094555",
"url": "https://bugzilla.suse.com/1094555"
},
{
"category": "self",
"summary": "SUSE Bug 1096003",
"url": "https://bugzilla.suse.com/1096003"
},
{
"category": "self",
"summary": "SUSE Bug 1098633",
"url": "https://bugzilla.suse.com/1098633"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1102247",
"url": "https://bugzilla.suse.com/1102247"
},
{
"category": "self",
"summary": "SUSE Bug 1103186",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "self",
"summary": "SUSE Bug 1103259",
"url": "https://bugzilla.suse.com/1103259"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1106383",
"url": "https://bugzilla.suse.com/1106383"
},
{
"category": "self",
"summary": "SUSE Bug 1106751",
"url": "https://bugzilla.suse.com/1106751"
},
{
"category": "self",
"summary": "SUSE Bug 1108193",
"url": "https://bugzilla.suse.com/1108193"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1108937",
"url": "https://bugzilla.suse.com/1108937"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111331",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1112128",
"url": "https://bugzilla.suse.com/1112128"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1114542",
"url": "https://bugzilla.suse.com/1114542"
},
{
"category": "self",
"summary": "SUSE Bug 1114638",
"url": "https://bugzilla.suse.com/1114638"
},
{
"category": "self",
"summary": "SUSE Bug 1114685",
"url": "https://bugzilla.suse.com/1114685"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117114",
"url": "https://bugzilla.suse.com/1117114"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119113",
"url": "https://bugzilla.suse.com/1119113"
},
{
"category": "self",
"summary": "SUSE Bug 1119222",
"url": "https://bugzilla.suse.com/1119222"
},
{
"category": "self",
"summary": "SUSE Bug 1119532",
"url": "https://bugzilla.suse.com/1119532"
},
{
"category": "self",
"summary": "SUSE Bug 1119680",
"url": "https://bugzilla.suse.com/1119680"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120318",
"url": "https://bugzilla.suse.com/1120318"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122767",
"url": "https://bugzilla.suse.com/1122767"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1125703",
"url": "https://bugzilla.suse.com/1125703"
},
{
"category": "self",
"summary": "SUSE Bug 1126206",
"url": "https://bugzilla.suse.com/1126206"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1126704",
"url": "https://bugzilla.suse.com/1126704"
},
{
"category": "self",
"summary": "SUSE Bug 1127034",
"url": "https://bugzilla.suse.com/1127034"
},
{
"category": "self",
"summary": "SUSE Bug 1127175",
"url": "https://bugzilla.suse.com/1127175"
},
{
"category": "self",
"summary": "SUSE Bug 1127315",
"url": "https://bugzilla.suse.com/1127315"
},
{
"category": "self",
"summary": "SUSE Bug 1127371",
"url": "https://bugzilla.suse.com/1127371"
},
{
"category": "self",
"summary": "SUSE Bug 1127374",
"url": "https://bugzilla.suse.com/1127374"
},
{
"category": "self",
"summary": "SUSE Bug 1127611",
"url": "https://bugzilla.suse.com/1127611"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128415",
"url": "https://bugzilla.suse.com/1128415"
},
{
"category": "self",
"summary": "SUSE Bug 1128432",
"url": "https://bugzilla.suse.com/1128432"
},
{
"category": "self",
"summary": "SUSE Bug 1128544",
"url": "https://bugzilla.suse.com/1128544"
},
{
"category": "self",
"summary": "SUSE Bug 1128902",
"url": "https://bugzilla.suse.com/1128902"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128971",
"url": "https://bugzilla.suse.com/1128971"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129273",
"url": "https://bugzilla.suse.com/1129273"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1129845",
"url": "https://bugzilla.suse.com/1129845"
},
{
"category": "self",
"summary": "SUSE Bug 1130195",
"url": "https://bugzilla.suse.com/1130195"
},
{
"category": "self",
"summary": "SUSE Bug 1130425",
"url": "https://bugzilla.suse.com/1130425"
},
{
"category": "self",
"summary": "SUSE Bug 1130527",
"url": "https://bugzilla.suse.com/1130527"
},
{
"category": "self",
"summary": "SUSE Bug 1130567",
"url": "https://bugzilla.suse.com/1130567"
},
{
"category": "self",
"summary": "SUSE Bug 1130579",
"url": "https://bugzilla.suse.com/1130579"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1130836",
"url": "https://bugzilla.suse.com/1130836"
},
{
"category": "self",
"summary": "SUSE Bug 1130937",
"url": "https://bugzilla.suse.com/1130937"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131326",
"url": "https://bugzilla.suse.com/1131326"
},
{
"category": "self",
"summary": "SUSE Bug 1131427",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "self",
"summary": "SUSE Bug 1131438",
"url": "https://bugzilla.suse.com/1131438"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131467",
"url": "https://bugzilla.suse.com/1131467"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131530",
"url": "https://bugzilla.suse.com/1131530"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131574",
"url": "https://bugzilla.suse.com/1131574"
},
{
"category": "self",
"summary": "SUSE Bug 1131587",
"url": "https://bugzilla.suse.com/1131587"
},
{
"category": "self",
"summary": "SUSE Bug 1131645",
"url": "https://bugzilla.suse.com/1131645"
},
{
"category": "self",
"summary": "SUSE Bug 1131659",
"url": "https://bugzilla.suse.com/1131659"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1131847",
"url": "https://bugzilla.suse.com/1131847"
},
{
"category": "self",
"summary": "SUSE Bug 1131848",
"url": "https://bugzilla.suse.com/1131848"
},
{
"category": "self",
"summary": "SUSE Bug 1131851",
"url": "https://bugzilla.suse.com/1131851"
},
{
"category": "self",
"summary": "SUSE Bug 1131900",
"url": "https://bugzilla.suse.com/1131900"
},
{
"category": "self",
"summary": "SUSE Bug 1131934",
"url": "https://bugzilla.suse.com/1131934"
},
{
"category": "self",
"summary": "SUSE Bug 1131935",
"url": "https://bugzilla.suse.com/1131935"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1132219",
"url": "https://bugzilla.suse.com/1132219"
},
{
"category": "self",
"summary": "SUSE Bug 1132226",
"url": "https://bugzilla.suse.com/1132226"
},
{
"category": "self",
"summary": "SUSE Bug 1132227",
"url": "https://bugzilla.suse.com/1132227"
},
{
"category": "self",
"summary": "SUSE Bug 1132365",
"url": "https://bugzilla.suse.com/1132365"
},
{
"category": "self",
"summary": "SUSE Bug 1132368",
"url": "https://bugzilla.suse.com/1132368"
},
{
"category": "self",
"summary": "SUSE Bug 1132369",
"url": "https://bugzilla.suse.com/1132369"
},
{
"category": "self",
"summary": "SUSE Bug 1132370",
"url": "https://bugzilla.suse.com/1132370"
},
{
"category": "self",
"summary": "SUSE Bug 1132372",
"url": "https://bugzilla.suse.com/1132372"
},
{
"category": "self",
"summary": "SUSE Bug 1132373",
"url": "https://bugzilla.suse.com/1132373"
},
{
"category": "self",
"summary": "SUSE Bug 1132384",
"url": "https://bugzilla.suse.com/1132384"
},
{
"category": "self",
"summary": "SUSE Bug 1132390",
"url": "https://bugzilla.suse.com/1132390"
},
{
"category": "self",
"summary": "SUSE Bug 1132397",
"url": "https://bugzilla.suse.com/1132397"
},
{
"category": "self",
"summary": "SUSE Bug 1132402",
"url": "https://bugzilla.suse.com/1132402"
},
{
"category": "self",
"summary": "SUSE Bug 1132403",
"url": "https://bugzilla.suse.com/1132403"
},
{
"category": "self",
"summary": "SUSE Bug 1132404",
"url": "https://bugzilla.suse.com/1132404"
},
{
"category": "self",
"summary": "SUSE Bug 1132405",
"url": "https://bugzilla.suse.com/1132405"
},
{
"category": "self",
"summary": "SUSE Bug 1132407",
"url": "https://bugzilla.suse.com/1132407"
},
{
"category": "self",
"summary": "SUSE Bug 1132411",
"url": "https://bugzilla.suse.com/1132411"
},
{
"category": "self",
"summary": "SUSE Bug 1132412",
"url": "https://bugzilla.suse.com/1132412"
},
{
"category": "self",
"summary": "SUSE Bug 1132413",
"url": "https://bugzilla.suse.com/1132413"
},
{
"category": "self",
"summary": "SUSE Bug 1132414",
"url": "https://bugzilla.suse.com/1132414"
},
{
"category": "self",
"summary": "SUSE Bug 1132426",
"url": "https://bugzilla.suse.com/1132426"
},
{
"category": "self",
"summary": "SUSE Bug 1132527",
"url": "https://bugzilla.suse.com/1132527"
},
{
"category": "self",
"summary": "SUSE Bug 1132531",
"url": "https://bugzilla.suse.com/1132531"
},
{
"category": "self",
"summary": "SUSE Bug 1132555",
"url": "https://bugzilla.suse.com/1132555"
},
{
"category": "self",
"summary": "SUSE Bug 1132558",
"url": "https://bugzilla.suse.com/1132558"
},
{
"category": "self",
"summary": "SUSE Bug 1132561",
"url": "https://bugzilla.suse.com/1132561"
},
{
"category": "self",
"summary": "SUSE Bug 1132562",
"url": "https://bugzilla.suse.com/1132562"
},
{
"category": "self",
"summary": "SUSE Bug 1132563",
"url": "https://bugzilla.suse.com/1132563"
},
{
"category": "self",
"summary": "SUSE Bug 1132564",
"url": "https://bugzilla.suse.com/1132564"
},
{
"category": "self",
"summary": "SUSE Bug 1132570",
"url": "https://bugzilla.suse.com/1132570"
},
{
"category": "self",
"summary": "SUSE Bug 1132571",
"url": "https://bugzilla.suse.com/1132571"
},
{
"category": "self",
"summary": "SUSE Bug 1132572",
"url": "https://bugzilla.suse.com/1132572"
},
{
"category": "self",
"summary": "SUSE Bug 1132589",
"url": "https://bugzilla.suse.com/1132589"
},
{
"category": "self",
"summary": "SUSE Bug 1132618",
"url": "https://bugzilla.suse.com/1132618"
},
{
"category": "self",
"summary": "SUSE Bug 1132673",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "self",
"summary": "SUSE Bug 1132681",
"url": "https://bugzilla.suse.com/1132681"
},
{
"category": "self",
"summary": "SUSE Bug 1132726",
"url": "https://bugzilla.suse.com/1132726"
},
{
"category": "self",
"summary": "SUSE Bug 1132828",
"url": "https://bugzilla.suse.com/1132828"
},
{
"category": "self",
"summary": "SUSE Bug 1132894",
"url": "https://bugzilla.suse.com/1132894"
},
{
"category": "self",
"summary": "SUSE Bug 1132943",
"url": "https://bugzilla.suse.com/1132943"
},
{
"category": "self",
"summary": "SUSE Bug 1132982",
"url": "https://bugzilla.suse.com/1132982"
},
{
"category": "self",
"summary": "SUSE Bug 1133005",
"url": "https://bugzilla.suse.com/1133005"
},
{
"category": "self",
"summary": "SUSE Bug 1133016",
"url": "https://bugzilla.suse.com/1133016"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1133094",
"url": "https://bugzilla.suse.com/1133094"
},
{
"category": "self",
"summary": "SUSE Bug 1133095",
"url": "https://bugzilla.suse.com/1133095"
},
{
"category": "self",
"summary": "SUSE Bug 1133115",
"url": "https://bugzilla.suse.com/1133115"
},
{
"category": "self",
"summary": "SUSE Bug 1133149",
"url": "https://bugzilla.suse.com/1133149"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133311",
"url": "https://bugzilla.suse.com/1133311"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133401",
"url": "https://bugzilla.suse.com/1133401"
},
{
"category": "self",
"summary": "SUSE Bug 1133486",
"url": "https://bugzilla.suse.com/1133486"
},
{
"category": "self",
"summary": "SUSE Bug 1133529",
"url": "https://bugzilla.suse.com/1133529"
},
{
"category": "self",
"summary": "SUSE Bug 1133547",
"url": "https://bugzilla.suse.com/1133547"
},
{
"category": "self",
"summary": "SUSE Bug 1133584",
"url": "https://bugzilla.suse.com/1133584"
},
{
"category": "self",
"summary": "SUSE Bug 1133593",
"url": "https://bugzilla.suse.com/1133593"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1133667",
"url": "https://bugzilla.suse.com/1133667"
},
{
"category": "self",
"summary": "SUSE Bug 1133668",
"url": "https://bugzilla.suse.com/1133668"
},
{
"category": "self",
"summary": "SUSE Bug 1133672",
"url": "https://bugzilla.suse.com/1133672"
},
{
"category": "self",
"summary": "SUSE Bug 1133674",
"url": "https://bugzilla.suse.com/1133674"
},
{
"category": "self",
"summary": "SUSE Bug 1133675",
"url": "https://bugzilla.suse.com/1133675"
},
{
"category": "self",
"summary": "SUSE Bug 1133698",
"url": "https://bugzilla.suse.com/1133698"
},
{
"category": "self",
"summary": "SUSE Bug 1133702",
"url": "https://bugzilla.suse.com/1133702"
},
{
"category": "self",
"summary": "SUSE Bug 1133731",
"url": "https://bugzilla.suse.com/1133731"
},
{
"category": "self",
"summary": "SUSE Bug 1133738",
"url": "https://bugzilla.suse.com/1133738"
},
{
"category": "self",
"summary": "SUSE Bug 1133769",
"url": "https://bugzilla.suse.com/1133769"
},
{
"category": "self",
"summary": "SUSE Bug 1133772",
"url": "https://bugzilla.suse.com/1133772"
},
{
"category": "self",
"summary": "SUSE Bug 1133774",
"url": "https://bugzilla.suse.com/1133774"
},
{
"category": "self",
"summary": "SUSE Bug 1133778",
"url": "https://bugzilla.suse.com/1133778"
},
{
"category": "self",
"summary": "SUSE Bug 1133779",
"url": "https://bugzilla.suse.com/1133779"
},
{
"category": "self",
"summary": "SUSE Bug 1133780",
"url": "https://bugzilla.suse.com/1133780"
},
{
"category": "self",
"summary": "SUSE Bug 1133825",
"url": "https://bugzilla.suse.com/1133825"
},
{
"category": "self",
"summary": "SUSE Bug 1133850",
"url": "https://bugzilla.suse.com/1133850"
},
{
"category": "self",
"summary": "SUSE Bug 1133851",
"url": "https://bugzilla.suse.com/1133851"
},
{
"category": "self",
"summary": "SUSE Bug 1133852",
"url": "https://bugzilla.suse.com/1133852"
},
{
"category": "self",
"summary": "SUSE Bug 1133897",
"url": "https://bugzilla.suse.com/1133897"
},
{
"category": "self",
"summary": "SUSE Bug 1134090",
"url": "https://bugzilla.suse.com/1134090"
},
{
"category": "self",
"summary": "SUSE Bug 1134097",
"url": "https://bugzilla.suse.com/1134097"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134223",
"url": "https://bugzilla.suse.com/1134223"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134390",
"url": "https://bugzilla.suse.com/1134390"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134395",
"url": "https://bugzilla.suse.com/1134395"
},
{
"category": "self",
"summary": "SUSE Bug 1134397",
"url": "https://bugzilla.suse.com/1134397"
},
{
"category": "self",
"summary": "SUSE Bug 1134399",
"url": "https://bugzilla.suse.com/1134399"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134600",
"url": "https://bugzilla.suse.com/1134600"
},
{
"category": "self",
"summary": "SUSE Bug 1134607",
"url": "https://bugzilla.suse.com/1134607"
},
{
"category": "self",
"summary": "SUSE Bug 1134618",
"url": "https://bugzilla.suse.com/1134618"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134730",
"url": "https://bugzilla.suse.com/1134730"
},
{
"category": "self",
"summary": "SUSE Bug 1134738",
"url": "https://bugzilla.suse.com/1134738"
},
{
"category": "self",
"summary": "SUSE Bug 1134743",
"url": "https://bugzilla.suse.com/1134743"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1134945",
"url": "https://bugzilla.suse.com/1134945"
},
{
"category": "self",
"summary": "SUSE Bug 1134946",
"url": "https://bugzilla.suse.com/1134946"
},
{
"category": "self",
"summary": "SUSE Bug 1134947",
"url": "https://bugzilla.suse.com/1134947"
},
{
"category": "self",
"summary": "SUSE Bug 1134948",
"url": "https://bugzilla.suse.com/1134948"
},
{
"category": "self",
"summary": "SUSE Bug 1134949",
"url": "https://bugzilla.suse.com/1134949"
},
{
"category": "self",
"summary": "SUSE Bug 1134950",
"url": "https://bugzilla.suse.com/1134950"
},
{
"category": "self",
"summary": "SUSE Bug 1134951",
"url": "https://bugzilla.suse.com/1134951"
},
{
"category": "self",
"summary": "SUSE Bug 1134952",
"url": "https://bugzilla.suse.com/1134952"
},
{
"category": "self",
"summary": "SUSE Bug 1134953",
"url": "https://bugzilla.suse.com/1134953"
},
{
"category": "self",
"summary": "SUSE Bug 1134972",
"url": "https://bugzilla.suse.com/1134972"
},
{
"category": "self",
"summary": "SUSE Bug 1134974",
"url": "https://bugzilla.suse.com/1134974"
},
{
"category": "self",
"summary": "SUSE Bug 1134975",
"url": "https://bugzilla.suse.com/1134975"
},
{
"category": "self",
"summary": "SUSE Bug 1134980",
"url": "https://bugzilla.suse.com/1134980"
},
{
"category": "self",
"summary": "SUSE Bug 1134981",
"url": "https://bugzilla.suse.com/1134981"
},
{
"category": "self",
"summary": "SUSE Bug 1134983",
"url": "https://bugzilla.suse.com/1134983"
},
{
"category": "self",
"summary": "SUSE Bug 1134987",
"url": "https://bugzilla.suse.com/1134987"
},
{
"category": "self",
"summary": "SUSE Bug 1134989",
"url": "https://bugzilla.suse.com/1134989"
},
{
"category": "self",
"summary": "SUSE Bug 1134990",
"url": "https://bugzilla.suse.com/1134990"
},
{
"category": "self",
"summary": "SUSE Bug 1134994",
"url": "https://bugzilla.suse.com/1134994"
},
{
"category": "self",
"summary": "SUSE Bug 1134995",
"url": "https://bugzilla.suse.com/1134995"
},
{
"category": "self",
"summary": "SUSE Bug 1134998",
"url": "https://bugzilla.suse.com/1134998"
},
{
"category": "self",
"summary": "SUSE Bug 1134999",
"url": "https://bugzilla.suse.com/1134999"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135018",
"url": "https://bugzilla.suse.com/1135018"
},
{
"category": "self",
"summary": "SUSE Bug 1135021",
"url": "https://bugzilla.suse.com/1135021"
},
{
"category": "self",
"summary": "SUSE Bug 1135024",
"url": "https://bugzilla.suse.com/1135024"
},
{
"category": "self",
"summary": "SUSE Bug 1135026",
"url": "https://bugzilla.suse.com/1135026"
},
{
"category": "self",
"summary": "SUSE Bug 1135027",
"url": "https://bugzilla.suse.com/1135027"
},
{
"category": "self",
"summary": "SUSE Bug 1135028",
"url": "https://bugzilla.suse.com/1135028"
},
{
"category": "self",
"summary": "SUSE Bug 1135029",
"url": "https://bugzilla.suse.com/1135029"
},
{
"category": "self",
"summary": "SUSE Bug 1135031",
"url": "https://bugzilla.suse.com/1135031"
},
{
"category": "self",
"summary": "SUSE Bug 1135033",
"url": "https://bugzilla.suse.com/1135033"
},
{
"category": "self",
"summary": "SUSE Bug 1135034",
"url": "https://bugzilla.suse.com/1135034"
},
{
"category": "self",
"summary": "SUSE Bug 1135035",
"url": "https://bugzilla.suse.com/1135035"
},
{
"category": "self",
"summary": "SUSE Bug 1135036",
"url": "https://bugzilla.suse.com/1135036"
},
{
"category": "self",
"summary": "SUSE Bug 1135037",
"url": "https://bugzilla.suse.com/1135037"
},
{
"category": "self",
"summary": "SUSE Bug 1135038",
"url": "https://bugzilla.suse.com/1135038"
},
{
"category": "self",
"summary": "SUSE Bug 1135039",
"url": "https://bugzilla.suse.com/1135039"
},
{
"category": "self",
"summary": "SUSE Bug 1135041",
"url": "https://bugzilla.suse.com/1135041"
},
{
"category": "self",
"summary": "SUSE Bug 1135042",
"url": "https://bugzilla.suse.com/1135042"
},
{
"category": "self",
"summary": "SUSE Bug 1135044",
"url": "https://bugzilla.suse.com/1135044"
},
{
"category": "self",
"summary": "SUSE Bug 1135045",
"url": "https://bugzilla.suse.com/1135045"
},
{
"category": "self",
"summary": "SUSE Bug 1135046",
"url": "https://bugzilla.suse.com/1135046"
},
{
"category": "self",
"summary": "SUSE Bug 1135047",
"url": "https://bugzilla.suse.com/1135047"
},
{
"category": "self",
"summary": "SUSE Bug 1135049",
"url": "https://bugzilla.suse.com/1135049"
},
{
"category": "self",
"summary": "SUSE Bug 1135051",
"url": "https://bugzilla.suse.com/1135051"
},
{
"category": "self",
"summary": "SUSE Bug 1135052",
"url": "https://bugzilla.suse.com/1135052"
},
{
"category": "self",
"summary": "SUSE Bug 1135053",
"url": "https://bugzilla.suse.com/1135053"
},
{
"category": "self",
"summary": "SUSE Bug 1135055",
"url": "https://bugzilla.suse.com/1135055"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135058",
"url": "https://bugzilla.suse.com/1135058"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135153",
"url": "https://bugzilla.suse.com/1135153"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135296",
"url": "https://bugzilla.suse.com/1135296"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135335",
"url": "https://bugzilla.suse.com/1135335"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1135897",
"url": "https://bugzilla.suse.com/1135897"
},
{
"category": "self",
"summary": "SUSE Bug 1136156",
"url": "https://bugzilla.suse.com/1136156"
},
{
"category": "self",
"summary": "SUSE Bug 1136157",
"url": "https://bugzilla.suse.com/1136157"
},
{
"category": "self",
"summary": "SUSE Bug 1136161",
"url": "https://bugzilla.suse.com/1136161"
},
{
"category": "self",
"summary": "SUSE Bug 1136188",
"url": "https://bugzilla.suse.com/1136188"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136215",
"url": "https://bugzilla.suse.com/1136215"
},
{
"category": "self",
"summary": "SUSE Bug 1136217",
"url": "https://bugzilla.suse.com/1136217"
},
{
"category": "self",
"summary": "SUSE Bug 1136264",
"url": "https://bugzilla.suse.com/1136264"
},
{
"category": "self",
"summary": "SUSE Bug 1136271",
"url": "https://bugzilla.suse.com/1136271"
},
{
"category": "self",
"summary": "SUSE Bug 1136333",
"url": "https://bugzilla.suse.com/1136333"
},
{
"category": "self",
"summary": "SUSE Bug 1136342",
"url": "https://bugzilla.suse.com/1136342"
},
{
"category": "self",
"summary": "SUSE Bug 1136343",
"url": "https://bugzilla.suse.com/1136343"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1136347",
"url": "https://bugzilla.suse.com/1136347"
},
{
"category": "self",
"summary": "SUSE Bug 1136348",
"url": "https://bugzilla.suse.com/1136348"
},
{
"category": "self",
"summary": "SUSE Bug 1136353",
"url": "https://bugzilla.suse.com/1136353"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136456",
"url": "https://bugzilla.suse.com/1136456"
},
{
"category": "self",
"summary": "SUSE Bug 1136460",
"url": "https://bugzilla.suse.com/1136460"
},
{
"category": "self",
"summary": "SUSE Bug 1136461",
"url": "https://bugzilla.suse.com/1136461"
},
{
"category": "self",
"summary": "SUSE Bug 1136462",
"url": "https://bugzilla.suse.com/1136462"
},
{
"category": "self",
"summary": "SUSE Bug 1136467",
"url": "https://bugzilla.suse.com/1136467"
},
{
"category": "self",
"summary": "SUSE Bug 1136469",
"url": "https://bugzilla.suse.com/1136469"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136498",
"url": "https://bugzilla.suse.com/1136498"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136598",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136922",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136978",
"url": "https://bugzilla.suse.com/1136978"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137103",
"url": "https://bugzilla.suse.com/1137103"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137194",
"url": "https://bugzilla.suse.com/1137194"
},
{
"category": "self",
"summary": "SUSE Bug 1137201",
"url": "https://bugzilla.suse.com/1137201"
},
{
"category": "self",
"summary": "SUSE Bug 1137224",
"url": "https://bugzilla.suse.com/1137224"
},
{
"category": "self",
"summary": "SUSE Bug 1137232",
"url": "https://bugzilla.suse.com/1137232"
},
{
"category": "self",
"summary": "SUSE Bug 1137233",
"url": "https://bugzilla.suse.com/1137233"
},
{
"category": "self",
"summary": "SUSE Bug 1137236",
"url": "https://bugzilla.suse.com/1137236"
},
{
"category": "self",
"summary": "SUSE Bug 1137366",
"url": "https://bugzilla.suse.com/1137366"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137429",
"url": "https://bugzilla.suse.com/1137429"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137458",
"url": "https://bugzilla.suse.com/1137458"
},
{
"category": "self",
"summary": "SUSE Bug 1137534",
"url": "https://bugzilla.suse.com/1137534"
},
{
"category": "self",
"summary": "SUSE Bug 1137535",
"url": "https://bugzilla.suse.com/1137535"
},
{
"category": "self",
"summary": "SUSE Bug 1137584",
"url": "https://bugzilla.suse.com/1137584"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137609",
"url": "https://bugzilla.suse.com/1137609"
},
{
"category": "self",
"summary": "SUSE Bug 1137625",
"url": "https://bugzilla.suse.com/1137625"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 1137811",
"url": "https://bugzilla.suse.com/1137811"
},
{
"category": "self",
"summary": "SUSE Bug 1137827",
"url": "https://bugzilla.suse.com/1137827"
},
{
"category": "self",
"summary": "SUSE Bug 1137884",
"url": "https://bugzilla.suse.com/1137884"
},
{
"category": "self",
"summary": "SUSE Bug 1137985",
"url": "https://bugzilla.suse.com/1137985"
},
{
"category": "self",
"summary": "SUSE Bug 1137995",
"url": "https://bugzilla.suse.com/1137995"
},
{
"category": "self",
"summary": "SUSE Bug 1137996",
"url": "https://bugzilla.suse.com/1137996"
},
{
"category": "self",
"summary": "SUSE Bug 1137998",
"url": "https://bugzilla.suse.com/1137998"
},
{
"category": "self",
"summary": "SUSE Bug 1137999",
"url": "https://bugzilla.suse.com/1137999"
},
{
"category": "self",
"summary": "SUSE Bug 1138000",
"url": "https://bugzilla.suse.com/1138000"
},
{
"category": "self",
"summary": "SUSE Bug 1138002",
"url": "https://bugzilla.suse.com/1138002"
},
{
"category": "self",
"summary": "SUSE Bug 1138003",
"url": "https://bugzilla.suse.com/1138003"
},
{
"category": "self",
"summary": "SUSE Bug 1138005",
"url": "https://bugzilla.suse.com/1138005"
},
{
"category": "self",
"summary": "SUSE Bug 1138006",
"url": "https://bugzilla.suse.com/1138006"
},
{
"category": "self",
"summary": "SUSE Bug 1138007",
"url": "https://bugzilla.suse.com/1138007"
},
{
"category": "self",
"summary": "SUSE Bug 1138008",
"url": "https://bugzilla.suse.com/1138008"
},
{
"category": "self",
"summary": "SUSE Bug 1138009",
"url": "https://bugzilla.suse.com/1138009"
},
{
"category": "self",
"summary": "SUSE Bug 1138010",
"url": "https://bugzilla.suse.com/1138010"
},
{
"category": "self",
"summary": "SUSE Bug 1138011",
"url": "https://bugzilla.suse.com/1138011"
},
{
"category": "self",
"summary": "SUSE Bug 1138012",
"url": "https://bugzilla.suse.com/1138012"
},
{
"category": "self",
"summary": "SUSE Bug 1138013",
"url": "https://bugzilla.suse.com/1138013"
},
{
"category": "self",
"summary": "SUSE Bug 1138014",
"url": "https://bugzilla.suse.com/1138014"
},
{
"category": "self",
"summary": "SUSE Bug 1138015",
"url": "https://bugzilla.suse.com/1138015"
},
{
"category": "self",
"summary": "SUSE Bug 1138016",
"url": "https://bugzilla.suse.com/1138016"
},
{
"category": "self",
"summary": "SUSE Bug 1138017",
"url": "https://bugzilla.suse.com/1138017"
},
{
"category": "self",
"summary": "SUSE Bug 1138018",
"url": "https://bugzilla.suse.com/1138018"
},
{
"category": "self",
"summary": "SUSE Bug 1138019",
"url": "https://bugzilla.suse.com/1138019"
},
{
"category": "self",
"summary": "SUSE Bug 1138263",
"url": "https://bugzilla.suse.com/1138263"
},
{
"category": "self",
"summary": "SUSE Bug 1138291",
"url": "https://bugzilla.suse.com/1138291"
},
{
"category": "self",
"summary": "SUSE Bug 1138293",
"url": "https://bugzilla.suse.com/1138293"
},
{
"category": "self",
"summary": "SUSE Bug 1138336",
"url": "https://bugzilla.suse.com/1138336"
},
{
"category": "self",
"summary": "SUSE Bug 1138374",
"url": "https://bugzilla.suse.com/1138374"
},
{
"category": "self",
"summary": "SUSE Bug 1138375",
"url": "https://bugzilla.suse.com/1138375"
},
{
"category": "self",
"summary": "SUSE Bug 1138589",
"url": "https://bugzilla.suse.com/1138589"
},
{
"category": "self",
"summary": "SUSE Bug 1138681",
"url": "https://bugzilla.suse.com/1138681"
},
{
"category": "self",
"summary": "SUSE Bug 1138719",
"url": "https://bugzilla.suse.com/1138719"
},
{
"category": "self",
"summary": "SUSE Bug 1138732",
"url": "https://bugzilla.suse.com/1138732"
},
{
"category": "self",
"summary": "SUSE Bug 1138874",
"url": "https://bugzilla.suse.com/1138874"
},
{
"category": "self",
"summary": "SUSE Bug 1138879",
"url": "https://bugzilla.suse.com/1138879"
},
{
"category": "self",
"summary": "SUSE Bug 1139358",
"url": "https://bugzilla.suse.com/1139358"
},
{
"category": "self",
"summary": "SUSE Bug 1139619",
"url": "https://bugzilla.suse.com/1139619"
},
{
"category": "self",
"summary": "SUSE Bug 1139712",
"url": "https://bugzilla.suse.com/1139712"
},
{
"category": "self",
"summary": "SUSE Bug 1139751",
"url": "https://bugzilla.suse.com/1139751"
},
{
"category": "self",
"summary": "SUSE Bug 1139771",
"url": "https://bugzilla.suse.com/1139771"
},
{
"category": "self",
"summary": "SUSE Bug 1139865",
"url": "https://bugzilla.suse.com/1139865"
},
{
"category": "self",
"summary": "SUSE Bug 1140133",
"url": "https://bugzilla.suse.com/1140133"
},
{
"category": "self",
"summary": "SUSE Bug 1140139",
"url": "https://bugzilla.suse.com/1140139"
},
{
"category": "self",
"summary": "SUSE Bug 1140228",
"url": "https://bugzilla.suse.com/1140228"
},
{
"category": "self",
"summary": "SUSE Bug 1140322",
"url": "https://bugzilla.suse.com/1140322"
},
{
"category": "self",
"summary": "SUSE Bug 1140328",
"url": "https://bugzilla.suse.com/1140328"
},
{
"category": "self",
"summary": "SUSE Bug 1140405",
"url": "https://bugzilla.suse.com/1140405"
},
{
"category": "self",
"summary": "SUSE Bug 1140424",
"url": "https://bugzilla.suse.com/1140424"
},
{
"category": "self",
"summary": "SUSE Bug 1140428",
"url": "https://bugzilla.suse.com/1140428"
},
{
"category": "self",
"summary": "SUSE Bug 1140454",
"url": "https://bugzilla.suse.com/1140454"
},
{
"category": "self",
"summary": "SUSE Bug 1140463",
"url": "https://bugzilla.suse.com/1140463"
},
{
"category": "self",
"summary": "SUSE Bug 1140559",
"url": "https://bugzilla.suse.com/1140559"
},
{
"category": "self",
"summary": "SUSE Bug 1140575",
"url": "https://bugzilla.suse.com/1140575"
},
{
"category": "self",
"summary": "SUSE Bug 1140577",
"url": "https://bugzilla.suse.com/1140577"
},
{
"category": "self",
"summary": "SUSE Bug 1140637",
"url": "https://bugzilla.suse.com/1140637"
},
{
"category": "self",
"summary": "SUSE Bug 1140652",
"url": "https://bugzilla.suse.com/1140652"
},
{
"category": "self",
"summary": "SUSE Bug 1140658",
"url": "https://bugzilla.suse.com/1140658"
},
{
"category": "self",
"summary": "SUSE Bug 1140676",
"url": "https://bugzilla.suse.com/1140676"
},
{
"category": "self",
"summary": "SUSE Bug 1140715",
"url": "https://bugzilla.suse.com/1140715"
},
{
"category": "self",
"summary": "SUSE Bug 1140719",
"url": "https://bugzilla.suse.com/1140719"
},
{
"category": "self",
"summary": "SUSE Bug 1140726",
"url": "https://bugzilla.suse.com/1140726"
},
{
"category": "self",
"summary": "SUSE Bug 1140727",
"url": "https://bugzilla.suse.com/1140727"
},
{
"category": "self",
"summary": "SUSE Bug 1140728",
"url": "https://bugzilla.suse.com/1140728"
},
{
"category": "self",
"summary": "SUSE Bug 1140814",
"url": "https://bugzilla.suse.com/1140814"
},
{
"category": "self",
"summary": "SUSE Bug 1140887",
"url": "https://bugzilla.suse.com/1140887"
},
{
"category": "self",
"summary": "SUSE Bug 1140888",
"url": "https://bugzilla.suse.com/1140888"
},
{
"category": "self",
"summary": "SUSE Bug 1140889",
"url": "https://bugzilla.suse.com/1140889"
},
{
"category": "self",
"summary": "SUSE Bug 1140891",
"url": "https://bugzilla.suse.com/1140891"
},
{
"category": "self",
"summary": "SUSE Bug 1140893",
"url": "https://bugzilla.suse.com/1140893"
},
{
"category": "self",
"summary": "SUSE Bug 1140903",
"url": "https://bugzilla.suse.com/1140903"
},
{
"category": "self",
"summary": "SUSE Bug 1140945",
"url": "https://bugzilla.suse.com/1140945"
},
{
"category": "self",
"summary": "SUSE Bug 1140948",
"url": "https://bugzilla.suse.com/1140948"
},
{
"category": "self",
"summary": "SUSE Bug 1140954",
"url": "https://bugzilla.suse.com/1140954"
},
{
"category": "self",
"summary": "SUSE Bug 1140955",
"url": "https://bugzilla.suse.com/1140955"
},
{
"category": "self",
"summary": "SUSE Bug 1140956",
"url": "https://bugzilla.suse.com/1140956"
},
{
"category": "self",
"summary": "SUSE Bug 1140957",
"url": "https://bugzilla.suse.com/1140957"
},
{
"category": "self",
"summary": "SUSE Bug 1140958",
"url": "https://bugzilla.suse.com/1140958"
},
{
"category": "self",
"summary": "SUSE Bug 1140959",
"url": "https://bugzilla.suse.com/1140959"
},
{
"category": "self",
"summary": "SUSE Bug 1140960",
"url": "https://bugzilla.suse.com/1140960"
},
{
"category": "self",
"summary": "SUSE Bug 1140961",
"url": "https://bugzilla.suse.com/1140961"
},
{
"category": "self",
"summary": "SUSE Bug 1140962",
"url": "https://bugzilla.suse.com/1140962"
},
{
"category": "self",
"summary": "SUSE Bug 1140964",
"url": "https://bugzilla.suse.com/1140964"
},
{
"category": "self",
"summary": "SUSE Bug 1140971",
"url": "https://bugzilla.suse.com/1140971"
},
{
"category": "self",
"summary": "SUSE Bug 1140972",
"url": "https://bugzilla.suse.com/1140972"
},
{
"category": "self",
"summary": "SUSE Bug 1140992",
"url": "https://bugzilla.suse.com/1140992"
},
{
"category": "self",
"summary": "SUSE Bug 1141312",
"url": "https://bugzilla.suse.com/1141312"
},
{
"category": "self",
"summary": "SUSE Bug 1141401",
"url": "https://bugzilla.suse.com/1141401"
},
{
"category": "self",
"summary": "SUSE Bug 1141402",
"url": "https://bugzilla.suse.com/1141402"
},
{
"category": "self",
"summary": "SUSE Bug 1141452",
"url": "https://bugzilla.suse.com/1141452"
},
{
"category": "self",
"summary": "SUSE Bug 1141453",
"url": "https://bugzilla.suse.com/1141453"
},
{
"category": "self",
"summary": "SUSE Bug 1141454",
"url": "https://bugzilla.suse.com/1141454"
},
{
"category": "self",
"summary": "SUSE Bug 1141478",
"url": "https://bugzilla.suse.com/1141478"
},
{
"category": "self",
"summary": "SUSE Bug 1141558",
"url": "https://bugzilla.suse.com/1141558"
},
{
"category": "self",
"summary": "SUSE Bug 1142023",
"url": "https://bugzilla.suse.com/1142023"
},
{
"category": "self",
"summary": "SUSE Bug 1142052",
"url": "https://bugzilla.suse.com/1142052"
},
{
"category": "self",
"summary": "SUSE Bug 1142083",
"url": "https://bugzilla.suse.com/1142083"
},
{
"category": "self",
"summary": "SUSE Bug 1142112",
"url": "https://bugzilla.suse.com/1142112"
},
{
"category": "self",
"summary": "SUSE Bug 1142115",
"url": "https://bugzilla.suse.com/1142115"
},
{
"category": "self",
"summary": "SUSE Bug 1142119",
"url": "https://bugzilla.suse.com/1142119"
},
{
"category": "self",
"summary": "SUSE Bug 1142220",
"url": "https://bugzilla.suse.com/1142220"
},
{
"category": "self",
"summary": "SUSE Bug 1142221",
"url": "https://bugzilla.suse.com/1142221"
},
{
"category": "self",
"summary": "SUSE Bug 1142254",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "self",
"summary": "SUSE Bug 1142350",
"url": "https://bugzilla.suse.com/1142350"
},
{
"category": "self",
"summary": "SUSE Bug 1142351",
"url": "https://bugzilla.suse.com/1142351"
},
{
"category": "self",
"summary": "SUSE Bug 1142354",
"url": "https://bugzilla.suse.com/1142354"
},
{
"category": "self",
"summary": "SUSE Bug 1142359",
"url": "https://bugzilla.suse.com/1142359"
},
{
"category": "self",
"summary": "SUSE Bug 1142450",
"url": "https://bugzilla.suse.com/1142450"
},
{
"category": "self",
"summary": "SUSE Bug 1142623",
"url": "https://bugzilla.suse.com/1142623"
},
{
"category": "self",
"summary": "SUSE Bug 1142673",
"url": "https://bugzilla.suse.com/1142673"
},
{
"category": "self",
"summary": "SUSE Bug 1142701",
"url": "https://bugzilla.suse.com/1142701"
},
{
"category": "self",
"summary": "SUSE Bug 1142868",
"url": "https://bugzilla.suse.com/1142868"
},
{
"category": "self",
"summary": "SUSE Bug 1143003",
"url": "https://bugzilla.suse.com/1143003"
},
{
"category": "self",
"summary": "SUSE Bug 1143045",
"url": "https://bugzilla.suse.com/1143045"
},
{
"category": "self",
"summary": "SUSE Bug 1143105",
"url": "https://bugzilla.suse.com/1143105"
},
{
"category": "self",
"summary": "SUSE Bug 1143185",
"url": "https://bugzilla.suse.com/1143185"
},
{
"category": "self",
"summary": "SUSE Bug 1143189",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "self",
"summary": "SUSE Bug 1143191",
"url": "https://bugzilla.suse.com/1143191"
},
{
"category": "self",
"summary": "SUSE Bug 1143209",
"url": "https://bugzilla.suse.com/1143209"
},
{
"category": "self",
"summary": "SUSE Bug 1143507",
"url": "https://bugzilla.suse.com/1143507"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12127 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16871 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16871/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16880 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20836 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10638 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10638/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10639 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11091 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1125 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11599 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11810 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12380 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12614 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12817 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13631 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13648 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14283 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14284 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9003 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9503 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9503/"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4678",
"url": "https://bugzilla.suse.com/SLE-4678"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4679",
"url": "https://bugzilla.suse.com/SLE-4679"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4681",
"url": "https://bugzilla.suse.com/SLE-4681"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4683",
"url": "https://bugzilla.suse.com/SLE-4683"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4684",
"url": "https://bugzilla.suse.com/SLE-4684"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4688",
"url": "https://bugzilla.suse.com/SLE-4688"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4689",
"url": "https://bugzilla.suse.com/SLE-4689"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4692",
"url": "https://bugzilla.suse.com/SLE-4692"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4693",
"url": "https://bugzilla.suse.com/SLE-4693"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4694",
"url": "https://bugzilla.suse.com/SLE-4694"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4695",
"url": "https://bugzilla.suse.com/SLE-4695"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4699",
"url": "https://bugzilla.suse.com/SLE-4699"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4710",
"url": "https://bugzilla.suse.com/SLE-4710"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4712",
"url": "https://bugzilla.suse.com/SLE-4712"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4717",
"url": "https://bugzilla.suse.com/SLE-4717"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4721",
"url": "https://bugzilla.suse.com/SLE-4721"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4722",
"url": "https://bugzilla.suse.com/SLE-4722"
},
{
"category": "self",
"summary": "SUSE Bug SLE-4994",
"url": "https://bugzilla.suse.com/SLE-4994"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5759",
"url": "https://bugzilla.suse.com/SLE-5759"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5789",
"url": "https://bugzilla.suse.com/SLE-5789"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5802",
"url": "https://bugzilla.suse.com/SLE-5802"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5954",
"url": "https://bugzilla.suse.com/SLE-5954"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6197",
"url": "https://bugzilla.suse.com/SLE-6197"
}
],
"title": "Security update for kernel-source-rt",
"tracking": {
"current_release_date": "2019-09-23T07:31:22Z",
"generator": {
"date": "2019-09-23T07:31:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2430-1",
"initial_release_date": "2019-09-23T07:31:22Z",
"revision_history": [
{
"date": "2019-09-23T07:31:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-14.8.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-14.8.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-14.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-14.8.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-14.8.1.noarch",
"product_id": "kernel-source-rt-4.12.14-14.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-livepatch-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-14.8.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64",
"product_id": "reiserfs-kmp-rt-4.12.14-14.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-4.12.14-14.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP1",
"product": {
"name": "SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-14.8.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-14.8.1.noarch as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-14.8.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12127"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12127",
"url": "https://www.suse.com/security/cve/CVE-2018-12127"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-12127"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-16871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16871"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16871",
"url": "https://www.suse.com/security/cve/CVE-2018-16871"
},
{
"category": "external",
"summary": "SUSE Bug 1137103 for CVE-2018-16871",
"url": "https://bugzilla.suse.com/1137103"
},
{
"category": "external",
"summary": "SUSE Bug 1156320 for CVE-2018-16871",
"url": "https://bugzilla.suse.com/1156320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2018-16871"
},
{
"cve": "CVE-2018-16880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16880"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16880",
"url": "https://www.suse.com/security/cve/CVE-2018-16880"
},
{
"category": "external",
"summary": "SUSE Bug 1122767 for CVE-2018-16880",
"url": "https://bugzilla.suse.com/1122767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-16880"
},
{
"cve": "CVE-2018-20836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20836"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20836",
"url": "https://www.suse.com/security/cve/CVE-2018-20836"
},
{
"category": "external",
"summary": "SUSE Bug 1134395 for CVE-2018-20836",
"url": "https://bugzilla.suse.com/1134395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-20836"
},
{
"cve": "CVE-2018-20855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20855"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20855",
"url": "https://www.suse.com/security/cve/CVE-2018-20855"
},
{
"category": "external",
"summary": "SUSE Bug 1143045 for CVE-2018-20855",
"url": "https://bugzilla.suse.com/1143045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-20855"
},
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-10638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10638"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10638",
"url": "https://www.suse.com/security/cve/CVE-2019-10638"
},
{
"category": "external",
"summary": "SUSE Bug 1140575 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1140575"
},
{
"category": "external",
"summary": "SUSE Bug 1140577 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1140577"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1142129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-10638"
},
{
"cve": "CVE-2019-10639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10639"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10639",
"url": "https://www.suse.com/security/cve/CVE-2019-10639"
},
{
"category": "external",
"summary": "SUSE Bug 1140577 for CVE-2019-10639",
"url": "https://bugzilla.suse.com/1140577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-10639"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11091"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11091",
"url": "https://www.suse.com/security/cve/CVE-2019-11091"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1133319"
},
{
"category": "external",
"summary": "SUSE Bug 1135394 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1135394"
},
{
"category": "external",
"summary": "SUSE Bug 1138043 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1138043"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11091",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11091"
},
{
"cve": "CVE-2019-1125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1125"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.\nTo exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further.\nOn January 3, 2018, Microsoft released an advisory and security updates\u202frelated to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.\nMicrosoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1125",
"url": "https://www.suse.com/security/cve/CVE-2019-1125"
},
{
"category": "external",
"summary": "SUSE Bug 1139358 for CVE-2019-1125",
"url": "https://bugzilla.suse.com/1139358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11599"
}
],
"notes": [
{
"category": "general",
"text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11599",
"url": "https://www.suse.com/security/cve/CVE-2019-11599"
},
{
"category": "external",
"summary": "SUSE Bug 1131645 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1131645"
},
{
"category": "external",
"summary": "SUSE Bug 1133738 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1133738"
},
{
"category": "external",
"summary": "SUSE Bug 1157905 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1157905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11599"
},
{
"cve": "CVE-2019-11810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11810"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11810",
"url": "https://www.suse.com/security/cve/CVE-2019-11810"
},
{
"category": "external",
"summary": "SUSE Bug 1134399 for CVE-2019-11810",
"url": "https://bugzilla.suse.com/1134399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-11810"
},
{
"cve": "CVE-2019-11811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11811",
"url": "https://www.suse.com/security/cve/CVE-2019-11811"
},
{
"category": "external",
"summary": "SUSE Bug 1134397 for CVE-2019-11811",
"url": "https://bugzilla.suse.com/1134397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-11811"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12380"
}
],
"notes": [
{
"category": "general",
"text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12380",
"url": "https://www.suse.com/security/cve/CVE-2019-12380"
},
{
"category": "external",
"summary": "SUSE Bug 1136598 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-12380"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12456"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12456",
"url": "https://www.suse.com/security/cve/CVE-2019-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1136922 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "external",
"summary": "SUSE Bug 1136993 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-12456"
},
{
"cve": "CVE-2019-12614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12614"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12614",
"url": "https://www.suse.com/security/cve/CVE-2019-12614"
},
{
"category": "external",
"summary": "SUSE Bug 1137194 for CVE-2019-12614",
"url": "https://bugzilla.suse.com/1137194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-12614"
},
{
"cve": "CVE-2019-12817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12817"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another\u0027s virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12817",
"url": "https://www.suse.com/security/cve/CVE-2019-12817"
},
{
"category": "external",
"summary": "SUSE Bug 1138263 for CVE-2019-12817",
"url": "https://bugzilla.suse.com/1138263"
},
{
"category": "external",
"summary": "SUSE Bug 1138264 for CVE-2019-12817",
"url": "https://bugzilla.suse.com/1138264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-12817"
},
{
"cve": "CVE-2019-12818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12818"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12818",
"url": "https://www.suse.com/security/cve/CVE-2019-12818"
},
{
"category": "external",
"summary": "SUSE Bug 1138293 for CVE-2019-12818",
"url": "https://bugzilla.suse.com/1138293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-12818"
},
{
"cve": "CVE-2019-12819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12819"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12819",
"url": "https://www.suse.com/security/cve/CVE-2019-12819"
},
{
"category": "external",
"summary": "SUSE Bug 1138291 for CVE-2019-12819",
"url": "https://bugzilla.suse.com/1138291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "low"
}
],
"title": "CVE-2019-12819"
},
{
"cve": "CVE-2019-13233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13233"
}
],
"notes": [
{
"category": "general",
"text": "In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13233",
"url": "https://www.suse.com/security/cve/CVE-2019-13233"
},
{
"category": "external",
"summary": "SUSE Bug 1140454 for CVE-2019-13233",
"url": "https://bugzilla.suse.com/1140454"
},
{
"category": "external",
"summary": "SUSE Bug 1144502 for CVE-2019-13233",
"url": "https://bugzilla.suse.com/1144502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-13233"
},
{
"cve": "CVE-2019-13631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13631"
}
],
"notes": [
{
"category": "general",
"text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13631",
"url": "https://www.suse.com/security/cve/CVE-2019-13631"
},
{
"category": "external",
"summary": "SUSE Bug 1142023 for CVE-2019-13631",
"url": "https://bugzilla.suse.com/1142023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-13631"
},
{
"cve": "CVE-2019-13648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13648"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13648",
"url": "https://www.suse.com/security/cve/CVE-2019-13648"
},
{
"category": "external",
"summary": "SUSE Bug 1142254 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "external",
"summary": "SUSE Bug 1142265 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-13648"
},
{
"cve": "CVE-2019-14283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14283",
"url": "https://www.suse.com/security/cve/CVE-2019-14283"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14283",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-14283"
},
{
"cve": "CVE-2019-14284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14284",
"url": "https://www.suse.com/security/cve/CVE-2019-14284"
},
{
"category": "external",
"summary": "SUSE Bug 1143189 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-14284"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-9003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a \"service ipmievd restart\" loop.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9003",
"url": "https://www.suse.com/security/cve/CVE-2019-9003"
},
{
"category": "external",
"summary": "SUSE Bug 1126704 for CVE-2019-9003",
"url": "https://bugzilla.suse.com/1126704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-9003"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2019-9503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9503"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9503",
"url": "https://www.suse.com/security/cve/CVE-2019-9503"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1132828"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1133319"
},
{
"category": "external",
"summary": "SUSE Bug 1156653 for CVE-2019-9503",
"url": "https://bugzilla.suse.com/1156653"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.8.1.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.8.1.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-23T07:31:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-9503"
}
]
}
suse-su-2019:14089-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel version 3.0.101 was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can\n trigger an integer overflow, leading to a kernel panic. (bsc#1137586)\n\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which\n will fragment the TCP retransmission queue. An attacker may have been able to\n further exploit the fragmented queue to cause an expensive linked-list walk\n for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which\n will fragment the RACK send map. A remote attacker may be able to further\n exploit the fragmented send map to cause an expensive linked-list walk for\n subsequent SACKs received for that same TCP connection. This would have\n resulted in excess resource consumption due to low mss values.\n\n- CVE-2014-9710: The Btrfs implementation in the Linux kernel did not ensure\n that the visible xattr state is consistent with a requested replacement,\n which allowed local users to bypass intended ACL settings and gain privileges\n via standard filesystem operations (1) during an xattr-replacement time\n window, related to a race condition, or (2) after an xattr-replacement\n attempt that fails because the data did not fit (bnc#923908).\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may be possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server (bnc#1120843).\n\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid\n programs (such as /bin/su) because install_exec_creds() is called too late in\n load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check\n has a race condition when reading /proc/pid/stat (bnc#1131543).\n\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in\n fs/proc/base.c in the Linux kernel It did not ensure that only root may\n inspect the kernel stack of an arbitrary task, allowing a local attacker to\n exploit racy stack unwinding and leak kernel task stack contents\n (bnc#1110785).\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a HIDPCONNADD command, because a\n name field may not end with a \u0027\\0\u0027 character (bnc#1134848).\n\n- CVE-2019-11486: The Siemens R3964 line discipline driver in\n drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions\n (bnc#1133188).\n\nThe following non-security bugs were fixed:\n\n- cifs: fix uninitialized memory access (bsc#1120326).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kernel: Add CEX7 toleration support (bsc#1131295).\n- net: ipsec: fix a kernel oops caused by reentrant workqueue (bsc#1119314).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- x86/MCE: Handle \u0027nosmt\u0027 offlining properly (bsc#1134729).\n- xfs: do not cache inodes read through bulkstat (bsc#1134102).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kernel-source-14089,slexsp3-kernel-source-14089",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14089-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:14089-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:14089-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1113769",
"url": "https://bugzilla.suse.com/1113769"
},
{
"category": "self",
"summary": "SUSE Bug 1119314",
"url": "https://bugzilla.suse.com/1119314"
},
{
"category": "self",
"summary": "SUSE Bug 1120326",
"url": "https://bugzilla.suse.com/1120326"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120885",
"url": "https://bugzilla.suse.com/1120885"
},
{
"category": "self",
"summary": "SUSE Bug 1131295",
"url": "https://bugzilla.suse.com/1131295"
},
{
"category": "self",
"summary": "SUSE Bug 1131543",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "self",
"summary": "SUSE Bug 1132374",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1132580",
"url": "https://bugzilla.suse.com/1132580"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1134102",
"url": "https://bugzilla.suse.com/1134102"
},
{
"category": "self",
"summary": "SUSE Bug 1134729",
"url": "https://bugzilla.suse.com/1134729"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 923908",
"url": "https://bugzilla.suse.com/923908"
},
{
"category": "self",
"summary": "SUSE Bug 939260",
"url": "https://bugzilla.suse.com/939260"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9710 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-18T10:58:36Z",
"generator": {
"date": "2019-06-18T10:58:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:14089-1",
"initial_release_date": "2019-06-18T10:58:36Z",
"revision_history": [
{
"date": "2019-06-18T10:58:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-default-3.0.101-108.95.2.i586",
"product_id": "kernel-default-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.95.2.i586",
"product_id": "kernel-default-base-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.95.2.i586",
"product_id": "kernel-default-devel-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.95.2.i586",
"product_id": "kernel-ec2-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.95.2.i586",
"product_id": "kernel-ec2-base-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.95.2.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-pae-3.0.101-108.95.2.i586",
"product_id": "kernel-pae-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.95.2.i586",
"product_id": "kernel-pae-base-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.95.2.i586",
"product_id": "kernel-pae-devel-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.95.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.95.1.i586",
"product_id": "kernel-source-3.0.101-108.95.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.95.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.95.1.i586",
"product_id": "kernel-syms-3.0.101-108.95.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-trace-3.0.101-108.95.2.i586",
"product_id": "kernel-trace-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.95.2.i586",
"product_id": "kernel-trace-base-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.95.2.i586",
"product_id": "kernel-trace-devel-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-xen-3.0.101-108.95.2.i586",
"product_id": "kernel-xen-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.95.2.i586",
"product_id": "kernel-xen-base-3.0.101-108.95.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.95.2.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.95.2.i586",
"product_id": "kernel-xen-devel-3.0.101-108.95.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.95.2.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.95.2.ppc64",
"product_id": "kernel-default-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.95.2.ppc64",
"product_id": "kernel-default-base-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.95.2.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.95.2.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.95.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.95.1.ppc64",
"product_id": "kernel-source-3.0.101-108.95.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.95.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.95.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.95.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.95.2.ppc64",
"product_id": "kernel-trace-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.95.2.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.95.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.95.2.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.95.2.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.95.2.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-default-3.0.101-108.95.2.s390x",
"product_id": "kernel-default-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.95.2.s390x",
"product_id": "kernel-default-base-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.95.2.s390x",
"product_id": "kernel-default-devel-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.95.2.s390x",
"product_id": "kernel-default-man-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.95.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.95.1.s390x",
"product_id": "kernel-source-3.0.101-108.95.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.95.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.95.1.s390x",
"product_id": "kernel-syms-3.0.101-108.95.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.95.2.s390x",
"product_id": "kernel-trace-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.95.2.s390x",
"product_id": "kernel-trace-base-3.0.101-108.95.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.95.2.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.95.2.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.95.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.95.2.x86_64",
"product_id": "kernel-default-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.95.2.x86_64",
"product_id": "kernel-default-base-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.95.2.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.95.2.x86_64",
"product_id": "kernel-ec2-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.95.2.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.95.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.95.1.x86_64",
"product_id": "kernel-source-3.0.101-108.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.95.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.95.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.95.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.95.2.x86_64",
"product_id": "kernel-trace-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.95.2.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.95.2.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.95.2.x86_64",
"product_id": "kernel-xen-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.95.2.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.95.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.95.2.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.95.2.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.95.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-default-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-default-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-pae-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.95.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.95.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.95.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.95.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.95.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.95.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.95.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.95.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.95.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.95.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.95.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.95.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.95.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.95.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-trace-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.95.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.95.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.95.2.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.95.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-xen-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.95.2.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.95.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.95.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.95.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-9710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9710"
}
],
"notes": [
{
"category": "general",
"text": "The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9710",
"url": "https://www.suse.com/security/cve/CVE-2014-9710"
},
{
"category": "external",
"summary": "SUSE Bug 923908 for CVE-2014-9710",
"url": "https://bugzilla.suse.com/923908"
},
{
"category": "external",
"summary": "SUSE Bug 939260 for CVE-2014-9710",
"url": "https://bugzilla.suse.com/939260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-9710"
},
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.95.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.95.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.95.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T10:58:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1533-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP1 kernel version 3.12.74 was updated to to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote\n attacker such that one can trigger an integer overflow, leading to a kernel\n panic. (bsc#1137586).\n\n- CVE-2019-11478: It is possible to send a crafted sequence of SACKs which\n will fragment the TCP retransmission queue. A remote attacker may be able to\n further exploit the fragmented queue to cause an expensive linked-list walk\n for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which\n will fragment the RACK send map. A remote attacker may be able to further\n exploit the fragmented send map to cause an expensive linked-list walk for\n subsequent SACKs received for that same TCP connection. This would have\n resulted in excess resource consumption due to low mss values.\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly\n escalate privileges was found in the mwifiex kernel module while connecting\n to a malicious wireless network. (bnc#1136424)\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may be possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server. (bnc#1120843)\n\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the\n unused memory region in the extent tree block, which might allow local users\n to obtain sensitive information by reading uninitialized data in the\n filesystem. (bnc#1135281)\n\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid\n programs (such as /bin/su) because install_exec_creds() is called too late in\n load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check\n has a race condition when reading /proc/pid/stat. (bnc#1131543)\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a HIDPCONNADD command, because a\n name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in\n fs/proc/base.c in the Linux kernel It did not ensure that only root may\n inspect the kernel stack of an arbitrary task, allowing a local attacker to\n exploit racy stack unwinding and leak kernel task stack contents.\n (bnc#1110785)\n\nThe following non-security bugs were fixed:\n\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kvm: x86: Fix the duplicated failure path handling in vmx_init (bsc#1104367).\n- lib: add \u0027on\u0027/\u0027off\u0027 support to strtobool (bsc#1125931).\n- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1125580).\n- powerpc/tm: Add TM Unavailable Exception (bsc#1125580).\n- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1533,SUSE-SLE-Module-Public-Cloud-12-2019-1533,SUSE-SLE-SAP-12-SP1-2019-1533,SUSE-SLE-SERVER-12-SP1-2019-1533",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1533-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1533-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1533-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html"
},
{
"category": "self",
"summary": "SUSE Bug 1104367",
"url": "https://bugzilla.suse.com/1104367"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1113769",
"url": "https://bugzilla.suse.com/1113769"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120885",
"url": "https://bugzilla.suse.com/1120885"
},
{
"category": "self",
"summary": "SUSE Bug 1125580",
"url": "https://bugzilla.suse.com/1125580"
},
{
"category": "self",
"summary": "SUSE Bug 1125931",
"url": "https://bugzilla.suse.com/1125931"
},
{
"category": "self",
"summary": "SUSE Bug 1131543",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "self",
"summary": "SUSE Bug 1131587",
"url": "https://bugzilla.suse.com/1131587"
},
{
"category": "self",
"summary": "SUSE Bug 1132374",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:21:43Z",
"generator": {
"date": "2019-06-17T17:21:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1533-1",
"initial_release_date": "2019-06-17T17:21:43Z",
"revision_history": [
{
"date": "2019-06-17T17:21:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.115.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.115.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.115.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.74-60.64.115.1.noarch",
"product": {
"name": "kernel-docs-3.12.74-60.64.115.1.noarch",
"product_id": "kernel-docs-3.12.74-60.64.115.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.115.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.115.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.115.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.115.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.115.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.115.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.12.74-60.64.115.1.noarch",
"product": {
"name": "kernel-source-vanilla-3.12.74-60.64.115.1.noarch",
"product_id": "kernel-source-vanilla-3.12.74-60.64.115.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-debug-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-debug-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-debug-base-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-debug-devel-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-debug-extra-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-default-extra-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-obs-build-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-obs-qa-3.12.74-60.64.115.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.115.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.115.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.115.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-default-extra-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-obs-build-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-obs-qa-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-vanilla-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.115.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-3.12.74-60.64.115.1.s390x",
"product": {
"name": "kernel-zfcpdump-3.12.74-60.64.115.1.s390x",
"product_id": "kernel-zfcpdump-3.12.74-60.64.115.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-debug-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-debug-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-debug-base-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-debug-devel-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-debug-extra-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-default-extra-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-ec2-base-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-obs-build-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-obs-qa-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-vanilla-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.12.74-60.64.115.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.12.74-60.64.115.1.x86_64",
"product_id": "kernel-xen-extra-3.12.74-60.64.115.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.115.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.115.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.115.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.115.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.115.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.115.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.115.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.115.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.115.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.115.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.115.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.115.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.115.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.115.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.115.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.115.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.115.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.115.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_115-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1581-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 6 for SLE 15)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-25_22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics may allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1135280).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1581,SUSE-SLE-Module-Live-Patching-15-2019-1579,SUSE-SLE-Module-Live-Patching-15-2019-1581,SUSE-SLE-Module-Live-Patching-15-2019-1582,SUSE-SLE-Module-Live-Patching-15-2019-1583,SUSE-SLE-Module-Live-Patching-15-2019-1584,SUSE-SLE-Module-Live-Patching-15-2019-1585,SUSE-SLE-Module-Live-Patching-15-2019-1586,SUSE-SLE-Module-Live-Patching-15-2019-1587",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1581-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1581-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1581-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1135280",
"url": "https://bugzilla.suse.com/1135280"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 6 for SLE 15)",
"tracking": {
"current_release_date": "2019-06-20T17:18:33Z",
"generator": {
"date": "2019-06-20T17:18:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1581-1",
"initial_release_date": "2019-06-20T17:18:33Z",
"revision_history": [
{
"date": "2019-06-20T17:18:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:18:33Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:18:33Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:18:33Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:18:33Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_13-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_16-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_19-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_22-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_25-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_28-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-10-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_6-default-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:18:33Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1529-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will\nfragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an\nexpensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM existed. It could have occured with FUSE requests. (bnc#1133190)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bnc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of ACPI submenu (bsc#1117158).\n- acpicA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).\n- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).\n- arm64: fix ACPI dependencies (bsc#1117158).\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- asoc: fix valid stream condition (bsc#1051510).\n- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- asoc: stm32: fix sai driver name initialisation (bsc#1051510).\n- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix rtnh_ok() (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- hid: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- hid: input: add mapping for Assistant key (bsc#1051510).\n- hid: input: add mapping for Expose/Overview key (bsc#1051510).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- input: introduce KEY_ASSISTANT (bsc#1051510).\n- input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: fix stats update from local clients (git-fixes).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI: protect dma-mapping.h include (kabi).\n- kABI: protect ip_options_rcv_srr (kabi).\n- kABI: protect struct mlx5_td (kabi).\n- kABI: protect struct pci_dev (kabi).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586)\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev-\u003ebitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd-\u003ename (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: legacy: do not unmask port bitmaps (git-fixes).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).\n- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).\n- netfilter: drop template ct when conntrack is skipped (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).\n- nfs: add module option to limit NFSv4 minor version (jsc#PM-231).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packet: validate msg_namelen in send directly (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- pci: Factor out pcie_retrain_link() function (git-fixes).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- pci: Work around Pericom PCIe-to-PCI bridge Retrain Link erratum (git-fixes).\n- pci: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, git-fixes).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, git-fixes).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- proc/kcore: do not bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: fix error message (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: serial_core, add -\u003einstall (bnc#1129693).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: cdc-acm: fix unthrottle races (bsc#1051510).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- usb: serial: fix unthrottle races (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- usb: yurex: Fix protection fault after device removal (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).\n- xfrm: Return error on unknown encap_type in init_state (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1529,SUSE-SLE-Module-Basesystem-15-2019-1529,SUSE-SLE-Module-Development-Tools-15-2019-1529,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1529,SUSE-SLE-Module-Legacy-15-2019-1529,SUSE-SLE-Module-Live-Patching-15-2019-1529,SUSE-SLE-Product-HA-15-2019-1529,SUSE-SLE-Product-WE-15-2019-1529",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1529-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1529-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1529-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108193",
"url": "https://bugzilla.suse.com/1108193"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1108937",
"url": "https://bugzilla.suse.com/1108937"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119843",
"url": "https://bugzilla.suse.com/1119843"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129273",
"url": "https://bugzilla.suse.com/1129273"
},
{
"category": "self",
"summary": "SUSE Bug 1129497",
"url": "https://bugzilla.suse.com/1129497"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130579",
"url": "https://bugzilla.suse.com/1130579"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131326",
"url": "https://bugzilla.suse.com/1131326"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:18:29Z",
"generator": {
"date": "2019-06-17T17:18:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1529-1",
"initial_release_date": "2019-06-17T17:18:29Z",
"revision_history": [
{
"date": "2019-06-17T17:18:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-al-4.12.14-150.22.1.aarch64",
"product_id": "dtb-al-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-allwinner-4.12.14-150.22.1.aarch64",
"product_id": "dtb-allwinner-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-altera-4.12.14-150.22.1.aarch64",
"product_id": "dtb-altera-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-amd-4.12.14-150.22.1.aarch64",
"product_id": "dtb-amd-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-amlogic-4.12.14-150.22.1.aarch64",
"product_id": "dtb-amlogic-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-apm-4.12.14-150.22.1.aarch64",
"product_id": "dtb-apm-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-arm-4.12.14-150.22.1.aarch64",
"product_id": "dtb-arm-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-broadcom-4.12.14-150.22.1.aarch64",
"product_id": "dtb-broadcom-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-cavium-4.12.14-150.22.1.aarch64",
"product_id": "dtb-cavium-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-exynos-4.12.14-150.22.1.aarch64",
"product_id": "dtb-exynos-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-freescale-4.12.14-150.22.1.aarch64",
"product_id": "dtb-freescale-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-hisilicon-4.12.14-150.22.1.aarch64",
"product_id": "dtb-hisilicon-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-lg-4.12.14-150.22.1.aarch64",
"product_id": "dtb-lg-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-marvell-4.12.14-150.22.1.aarch64",
"product_id": "dtb-marvell-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-mediatek-4.12.14-150.22.1.aarch64",
"product_id": "dtb-mediatek-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-nvidia-4.12.14-150.22.1.aarch64",
"product_id": "dtb-nvidia-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-qcom-4.12.14-150.22.1.aarch64",
"product_id": "dtb-qcom-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-renesas-4.12.14-150.22.1.aarch64",
"product_id": "dtb-renesas-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-rockchip-4.12.14-150.22.1.aarch64",
"product_id": "dtb-rockchip-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-socionext-4.12.14-150.22.1.aarch64",
"product_id": "dtb-socionext-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-sprd-4.12.14-150.22.1.aarch64",
"product_id": "dtb-sprd-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-xilinx-4.12.14-150.22.1.aarch64",
"product_id": "dtb-xilinx-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-4.12.14-150.22.1.aarch64",
"product": {
"name": "dtb-zte-4.12.14-150.22.1.aarch64",
"product_id": "dtb-zte-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.22.1.aarch64",
"product_id": "kernel-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.22.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.22.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.22.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.22.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.22.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.22.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.22.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.22.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.22.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.22.1.noarch",
"product_id": "kernel-devel-4.12.14-150.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.22.1.noarch",
"product_id": "kernel-docs-4.12.14-150.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.22.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.22.1.noarch",
"product_id": "kernel-macros-4.12.14-150.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.22.1.noarch",
"product_id": "kernel-source-4.12.14-150.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.22.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.22.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.22.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.22.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.22.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.22.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.22.1.s390x",
"product_id": "kernel-syms-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.22.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.22.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.22.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.22.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.22.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.22.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.22.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.22.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.22.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.22.1.x86_64",
"product_id": "kernel-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.22.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.22.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.22.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.22.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.22.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.22.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.22.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.22.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.22.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.22.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.22.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.22.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.22.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.22.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.22.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.22.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-150.22.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-150.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_22-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.22.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.22.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:18:29Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1527-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.180 to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can\n trigger an integer overflow, leading to a kernel panic. (bsc#1137586)\n\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which\n will fragment the TCP retransmission queue. An attacker may have been able to\n further exploit the fragmented queue to cause an expensive linked-list walk\n for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which\n will fragment the RACK send map. A remote attacker may be able to further\n exploit the fragmented send map to cause an expensive linked-list walk for\n subsequent SACKs received for that same TCP connection. This would have\n resulted in excess resource consumption due to low mss values.\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly\n escalate privileges was found in the mwifiex kernel module while connecting\n to a malicious wireless network. (bnc#1136424)\n\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in\n drivers/gpu/drm/drm_edid_load.c in the Linux kernel There was an unchecked\n kstrdup of fwstr, which might allow an attacker to cause a denial of service\n (NULL pointer dereference and system crash). (bnc#1136586)\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may be possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server. (bnc#1120843).\n\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the\n unused memory region in the extent tree block, which might allow local users\n to obtain sensitive information by reading uninitialized data in the\n filesystem. (bnc#1135281)\n\n- CVE-2018-7191: In the tun subsystem in the Linux kernel before 4.13.14,\n dev_get_valid_name is not called before register_netdevice. This allowed\n local users to cause a denial of service (NULL pointer dereference and panic)\n via an ioctl(TUNSETIFF) call with a dev name containing a / character. This\n is similar to CVE-2013-4343. (bnc#1135603)\n\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid\n programs (such as /bin/su) because install_exec_creds() is called too late in\n load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check\n has a race condition when reading /proc/pid/stat. (bnc#1131543)\n\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c\n in the Linux kernel There was a race condition leading to a use-after-free,\n related to net namespace cleanup. (bnc#1134537)\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a HIDPCONNADD command, because a\n name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in\n fs/proc/base.c in the Linux kernel It did not ensure that only root may\n inspect the kernel stack of an arbitrary task, allowing a local attacker to\n exploit racy stack unwinding and leak kernel task stack contents.\n (bnc#1110785)\n\n- CVE-2019-11486: The Siemens R3964 line discipline driver in\n drivers/tty/n_r3964.c in the Linux kernel has multiple race conditions.\n (bnc#1133188)\n\nThe following new features were implemented:\n\n- Updated the Chelsio cxgb4vf driver with the latest upstream patches.\n (fate#321660)\n\n- Backported changes into e1000e kernel module to support systems using the\n Intel I219-LM NIC chip. (fate#326719)\n\n- Import QLogic/Cavium qedr driver (RDMA) into the kernel. (fate#321747)\n\n- Update the QLogic/Cavium qed driver (NET). (fate#321703)\n\n- Update the QLogic/Cavium qede driver (NET). (fate#321702)\n\n- Update the Chelsio iw_cxgb4 driver with the latest upstream patches.\n (fate#321661)\n\n- Update the Chelsio cxgb4 driver with the latest upstream patches.\n (fate#321658)\n\n- Update support for Intel Omni Path (OPA) kernel driver. (fate#321473)\n\n- Update the QIB driver to the latest upstream version for up-to-date\n functionality and hardware support. (fate#321231)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bnc#1012382).\n- 9p: do not trust pdu content for stat item size (bnc#1012382).\n- ACPI / SBS: Fix GPE storm on recent MacBookPro\u0027s (bnc#1012382).\n- ALSA: PCM: check if ops are defined before suspending PCM (bnc#1012382).\n- ALSA: core: Fix card races between register and disconnect (bnc#1012382).\n- ALSA: echoaudio: add a check for ioremap_nocache (bnc#1012382).\n- ALSA: info: Fix racy addition/deletion of nodes (bnc#1012382).\n- ALSA: line6: use dynamic buffers (bnc#1012382).\n- ALSA: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bnc#1012382).\n- ALSA: sb8: add a check for request_region (bnc#1012382).\n- ALSA: seq: Fix OOB-reads from strlcpy (bnc#1012382).\n- ARM: 8833/1: Ensure that NEON code always compiles with Clang (bnc#1012382).\n- ARM: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bnc#1012382).\n- ARM: 8840/1: use a raw_spinlock_t in unwind (bnc#1012382).\n- ARM: avoid Cortex-A9 livelock on tight dmb loops (bnc#1012382).\n- ARM: dts: at91: Fix typo in ISC_D0 on PC9 (bnc#1012382).\n- ARM: dts: pfla02: increase phy reset duration (bnc#1012382).\n- ARM: iop: do not use using 64-bit DMA masks (bnc#1012382).\n- ARM: orion: do not use using 64-bit DMA masks (bnc#1012382).\n- ARM: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bnc#1012382).\n- ASoC: Intel: avoid Oops if DMA setup fails (bnc#1012382).\n- ASoC: cs4270: Set auto-increment bit for register writes (bnc#1012382).\n- ASoC: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bnc#1012382).\n- ASoC: fsl_esai: fix channel swap issue when stream starts (bnc#1012382).\n- ASoC: tlv320aic32x4: Fix Common Pins (bnc#1012382).\n- ASoC:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).\n- Bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).\n- Bluetooth: Fix decrementing reference count twice in releasing socket (bnc#1012382).\n- CIFS: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- Correct bsc/FATE numbers.\n- Do not jump to compute_result state from check_result state (bnc#1012382).\n- Documentation: Add MDS vulnerability documentation (bnc#1012382).\n- Documentation: Add nospectre_v1 parameter (bnc#1012382).\n- Documentation: Correct the possible MDS sysfs values (bnc#1012382).\n- Documentation: Move L1TF to separate directory (bnc#1012382).\n- HID: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).\n- HID: input: add mapping for Expose/Overview key (bnc#1012382).\n- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).\n- IB/hfi1: Eliminate opcode tests on mr deref ().\n- IB/hfi1: Unreserve a reserved request when it is completed ().\n- IB/mlx4: Fix race condition between catas error reset and aliasguid flows (bnc#1012382).\n- IB/mlx4: Increase the timeout for CM cache (bnc#1012382).\n- IB/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().\n- IB/rdmavt: Fix frwr memory registration ().\n- Input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).\n- KVM: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).\n- KVM: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bnc#1012382).\n- KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).\n- MIPS: scall64-o32: Fix indirect syscall number load (bnc#1012382).\n- NFS/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).\n- NFS: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).\n- NFS: Fix I/O request leakages (git-fixes).\n- NFS: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (bnc#1012382).\n- PCI: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bnc#1012382).\n- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).\n- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).\n- PCI: xilinx-nwl: Add missing of_node_put() (bsc#1100132).\n- RDMA/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).\n- RDMA/qedr: Fix out of bounds index check in query pkey (bsc#1022604).\n- Revert \u0027block/loop: Use global lock for ioctl() operation.\u0027 (bnc#1012382).\n- Revert \u0027block: unexport DISK_EVENT_MEDIA_CHANGE for legacy/fringe drivers\u0027 (bsc#1110946).\n- Revert \u0027cpu/speculation: Add \u0027mitigations=\u0027 cmdline option\u0027 (stable backports).\n- Revert \u0027ide: unexport DISK_EVENT_MEDIA_CHANGE for ide-gd and ide-cd\u0027 (bsc#1110946).\n- Revert \u0027kbuild: use -Oz instead of -Os when using clang\u0027 (bnc#1012382).\n- Revert \u0027locking/lockdep: Add debug_locks check in __lock_downgrade()\u0027 (bnc#1012382).\n- Revert \u0027netns: provide pure entropy for net_hash_mix()\u0027 (kabi).\n- Revert \u0027sched: Add sched_smt_active()\u0027 (stable backports).\n- Revert \u0027x86/MCE: Save microcode revision in machine check records\u0027 (kabi).\n- Revert \u0027x86/kprobes: Verify stack frame on kretprobe\u0027 (kabi).\n- Revert \u0027x86/speculation/mds: Add \u0027mitigations=\u0027 support for MDS\u0027 (stable backports).\n- Revert \u0027x86/speculation: Support \u0027mitigations=\u0027 cmdline option\u0027 (stable backports).\n- SoC: imx-sgtl5000: add missing put_device() (bnc#1012382).\n- UAS: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).\n- UAS: fix alignment of scatter/gather segments (bsc#1129770).\n- USB: Add new USB LPM helpers (bsc#1129770).\n- USB: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).\n- USB: cdc-acm: fix unthrottle races (bsc#1135642).\n- USB: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).\n- USB: core: Fix unterminated string returned by usb_string() (bnc#1012382).\n- USB: serial: fix unthrottle races (bnc#1012382).\n- USB: serial: use variable for status (bnc#1012382).\n- USB: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).\n- USB: yurex: Fix protection fault after device removal (bnc#1012382).\n- X.509: unpack RSA signatureValue field from BIT STRING (git-fixes).\n- appletalk: Fix compile regression (bnc#1012382).\n- appletalk: Fix use-after-free in atalk_proc_exit (bnc#1012382).\n- arm64/kernel: do not ban ADRP to work around Cortex-A53 erratum #843419 (bsc#1126040).\n- arm64/kernel: rename module_emit_adrp_veneer-\u003emodule_emit_veneer_for_adrp (bsc#1126040).\n- arm64: Add helper to decode register from instruction (bsc#1126040).\n- arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug signals (bnc#1012382).\n- arm64: debug: Ensure debug handlers check triggering exception level (bnc#1012382).\n- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (bnc#1012382).\n- arm64: futex: Restore oldval initialization to work around buggy compilers (bnc#1012382).\n- arm64: module-plts: factor out PLT generation code for ftrace (bsc#1126040).\n- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1126040).\n- arm64: module: split core and init PLT sections (bsc#1126040).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: comment on direct access to bvec table (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bnc#1012382).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bnc#1012382).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bnc#1012382).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: trace missed reading by cache_missed (bsc#1130972).\n- bcache: treat stale \u0026\u0026 dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bcache: writeback: properly order backing device IO (bsc#1130972).\n- binfmt_elf: switch to new creds when switching to new mm (bnc#1012382).\n- bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).\n- block: check_events: do not bother with events if unsupported (bsc#1110946).\n- block: disk_events: introduce event flags (bsc#1110946).\n- block: do not leak memory in bio_copy_user_iov() (bnc#1012382).\n- block: fix use-after-free on gendisk (bsc#1136448).\n- bnxt_en: Improve multicast address setup logic (bnc#1012382).\n- bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).\n- bonding: fix event handling for stacked bonds (bnc#1012382).\n- bonding: show full hw address in sysfs for slave entries (bnc#1012382).\n- bpf: reject wrong sized filters earlier (bnc#1012382).\n- bridge: Fix error path for kobject_init_and_add() (bnc#1012382).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1134651).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- cdc-acm: cleaning up debug in data submission path (bsc#1136539).\n- cdc-acm: fix race between reset and control messaging (bsc#1106110).\n- cdc-acm: handle read pipe errors (bsc#1135878).\n- cdc-acm: reassemble fragmented notifications (bsc#1136590).\n- cdc-acm: store in and out pipes in acm structure (bsc#1136575).\n- cdrom: Fix race condition in cdrom_sysctl_register (bnc#1012382).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134564).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134565).\n- ceph: only use d_name directly when parent is locked (bsc#1134566).\n- cifs: Fix NULL pointer dereference of devname (bnc#1012382).\n- cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).\n- cifs: fallback to older infolevels on findfirst queryinfo retry (bnc#1012382).\n- cifs: use correct format characters (bnc#1012382).\n- clk: fix mux clock documentation (bsc#1090888).\n- coresight: etm4x: Add support to enable ETMv4.2 (bnc#1012382).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bnc#1012382 bsc#1112178).\n- cpupower: remove stringop-truncation waring (bsc#1119086).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bnc#1012382).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bnc#1012382).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bnc#1012382).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bnc#1012382).\n- debugfs: fix use-after-free on symlink traversal (bnc#1012382).\n- device_cgroup: fix RCU imbalance in error case (bnc#1012382).\n- dm thin: add sanity checks to thin-pool and external snapshot creation (bnc#1012382).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bnc#1012382).\n- dmaengine: tegra: avoid overflow of byte tracking (bnc#1012382).\n- drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).\n- drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bnc#1012382).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bnc#1106929)\n- drm/i915: Fix I915_EXEC_RING_MASK (bnc#1106929)\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vc4: -\u003ex_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1106929)\n- drm/vc4: Account for interrupts in flight (bsc#1106929)\n- drm/vc4: Allocate the right amount of space for boot-time CRTC state. (bsc#1106929)\n- drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() (bsc#1106929)\n- drm/vc4: Fix OOPSes from trying to cache a partially constructed BO. (bsc#1106929)\n- drm/vc4: Fix a couple error codes in vc4_cl_lookup_bos() (bsc#1106929)\n- drm/vc4: Fix compilation error reported by kbuild test bot (bsc#1106929)\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1106929)\n- drm/vc4: Fix memory leak of the CRTC state. (bsc#1106929)\n- drm/vc4: Fix oops when userspace hands in a bad BO. (bsc#1106929)\n- drm/vc4: Fix overflow mem unreferencing when the binner runs dry. (bsc#1106929)\n- drm/vc4: Fix races when the CS reads from render targets. (bsc#1106929)\n- drm/vc4: Fix scaling of uni-planar formats (bsc#1106929)\n- drm/vc4: Fix the \u0027no scaling\u0027 case on multi-planar YUV formats (bsc#1106929)\n- drm/vc4: Flush the caches before the bin jobs, as well. (bsc#1106929)\n- drm/vc4: Free hang state before destroying BO cache. (bsc#1106929)\n- drm/vc4: Move IRQ enable to PM path (bsc#1106929)\n- drm/vc4: Reset -\u003e{x, y}_scaling[1] when dealing with uniplanar (bsc#1106929)\n- drm/vc4: Set -\u003eis_yuv to false when num_planes == 1 (bsc#1106929)\n- drm/vc4: Use drm_free_large() on handles to match its allocation. (bsc#1106929)\n- drm/vc4: fix a bounds check (bsc#1106929)\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)\n- dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).\n- e1000e: Add Support for 38.4MHZ frequency (bsc#1108293 ).\n- e1000e: Add Support for CannonLake (bsc#1108293).\n- e1000e: Fix -Wformat-truncation warnings (bnc#1012382).\n- e1000e: Initial Support for CannonLake (bsc#1108293 ).\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bnc#1012382).\n- exportfs: fix \u0027passing zero to ERR_PTR()\u0027 warning (bsc#1136458).\n- ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).\n- ext4: actually request zeroing of inode table after grow (bsc#1136451).\n- ext4: add missing brelse() in add_new_gdb_meta_bg() (bnc#1012382).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bnc#1012382).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).\n- ext4: prohibit fstrim in norecovery mode (bnc#1012382).\n- ext4: report real fs size after failed resize (bnc#1012382).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- f2fs: do not use mutex lock in atomic context (bnc#1012382).\n- f2fs: fix to do sanity check with current segment number (bnc#1012382).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bnc#1012382).\n- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bnc#1012382).\n- fs/file.c: initialize init_files.resize_wait (bnc#1012382).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).\n- fs: fix guard_bio_eod to check for real EOD errors (bnc#1012382).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- genirq: Prevent use-after-free and work list corruption (bnc#1012382).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bnc#1012382).\n- gpio: gpio-omap: fix level interrupt idling (bnc#1012382).\n- gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).\n- h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux- (bnc#1012382).\n- hugetlbfs: fix memory leak for resv_map (bnc#1012382).\n- hwrng: virtio - Avoid repeated init of completion (bnc#1012382).\n- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (bnc#1012382).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bnc#1012382).\n- iio: ad_sigma_delta: select channel when reading register (bnc#1012382).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bnc#1012382).\n- iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).\n- include/linux/bitrev.h: fix constant bitrev (bnc#1012382).\n- include/linux/swap.h: use offsetof() instead of custom __swapoffset macro (bnc#1012382).\n- init: initialize jump labels before command line option parsing (bnc#1012382).\n- io: accel: kxcjk1013: restore the range after resume (bnc#1012382).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135013).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135014).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135015).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (bnc#1012382).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).\n- ipv4: Fix raw socket lookup for local traffic (bnc#1012382).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (bnc#1012382).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).\n- ipv4: recompile ip options in ipv4_link_failure (bnc#1012382).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).\n- ipv6: Fix dangling pointer when ipv6 fragment (bnc#1012382).\n- ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).\n- ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).\n- ipv6: sit: reset ip header pointer in ipip6_rcv (bnc#1012382).\n- ipvs: do not schedule icmp errors from tunnels (bnc#1012382).\n- jffs2: fix use-after-free on symlink traversal (bnc#1012382).\n- kABI: protect ring_buffer_read_prepare (kabi).\n- kABI: protect struct tlb_state (kabi).\n- kABI: protect struct usb_interface (kabi).\n- kABI: restore ___ptrace_may_access (kabi).\n- kABI: restore icmp_send (kabi).\n- kabi: arm64: fix kabi breakage on arch specific module (bsc#1126040)\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD (bnc#1012382).\n- kbuild: simplify ld-option implementation (bnc#1012382).\n- kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).\n- kconfig: display recursive dependency resolution hint just once (bsc#1100132).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bnc#1012382).\n- keys: Timestamp new keys (bsc#1120902).\n- kprobes: Fix error check when reusing optimized probes (bnc#1012382).\n- kprobes: Mark ftrace mcount handler functions nokprobe (bnc#1012382).\n- kprobes: Prohibit probing on bsearch() (bnc#1012382).\n- leds: lp55xx: fix null deref on firmware load failure (bnc#1012382).\n- lib/div64.c: off by one in shift (bnc#1012382).\n- lib/int_sqrt: optimize initial value compute (bnc#1012382).\n- lib/string.c: implement a basic bcmp (bnc#1012382).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bnc#1012382).\n- libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bnc#1012382).\n- mac80211_hwsim: validate number of different channels (bsc#1085539).\n- md: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1132212).\n- media: mt9m111: set initial frame size other than 0x0 (bnc#1012382).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1135642).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bnc#1012382).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).\n- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1120902).\n- mm/cma.c: cma_declare_contiguous: correct err handling (bnc#1012382).\n- mm/page_ext.c: fix an imbalance with kmemleak (bnc#1012382).\n- mm/slab.c: kmemleak no scan alien caches (bnc#1012382).\n- mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512! (bnc#1012382).\n- mm/vmstat.c: fix /proc/vmstat format for CONFIG_DEBUG_TLBFLUSH=y CONFIG_SMP=n (bnc#1012382).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bnc#1012382).\n- mmc: davinci: remove extraneous __init annotation (bnc#1012382).\n- mmc: omap: fix the maximum timeout setting (bnc#1012382).\n- modpost: file2alias: check prototype of handler (bnc#1012382).\n- modpost: file2alias: go back to simple devtable lookup (bnc#1012382).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mt7601u: bump supported EEPROM version (bnc#1012382).\n- mtd: Fix comparison in map_word_andequal() (git-fixes).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net: atm: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (bnc#1012382).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).\n- net: ethernet: ti: fix possible object reference leak (bnc#1012382).\n- net: ethtool: not call vzalloc for zero sized memory request (bnc#1012382).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (bnc#1012382).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).\n- net: ibm: fix possible object reference leak (bnc#1012382).\n- net: ks8851: Delay requesting IRQ until opened (bnc#1012382).\n- net: ks8851: Dequeue RX packets explicitly (bnc#1012382).\n- net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).\n- net: ks8851: Set initial carrier state to down (bnc#1012382).\n- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock() (bnc#1012382).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).\n- net: xilinx: fix possible object reference leak (bnc#1012382).\n- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).\n- netfilter: compat: initialize all fields in xt_init (bnc#1012382).\n- netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).\n- netfilter: physdev: relax br_netfilter dependency (bnc#1012382).\n- netns: provide pure entropy for net_hash_mix() (bnc#1012382).\n- nfs: clean up rest of reqs when failing to add one (git-fixes).\n- nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-fc: resolve io failures during connect (bsc#1116803).\n- nvme: Do not allow to reset a reconnecting controller (bsc#1133874).\n- ocfs2: fix a panic problem caused by o2cb_ctl (bnc#1012382).\n- openvswitch: fix flow actions reallocation (bnc#1012382).\n- pNFS: Skip invalid stateids when doing a bulk destroy (git-fixes).\n- packet: Fix error path in packet_init (bnc#1012382).\n- packet: validate msg_namelen in send directly (bnc#1012382).\n- perf evsel: Free evsel-\u003ecounts in perf_evsel__exit() (bnc#1012382).\n- perf test: Fix failure of \u0027evsel-tp-sched\u0027 test on s390 (bnc#1012382).\n- perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() (bnc#1012382).\n- perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test (bnc#1012382).\n- perf top: Fix error handling in cmd_top() (bnc#1012382).\n- perf/core: Restore mmap record type correctly (bnc#1012382).\n- perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).\n- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).\n- powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).\n- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).\n- powerpc/64s: Include cpu header (bnc#1012382).\n- powerpc/booke64: set RI in default MSR (bnc#1012382).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1066223).\n- powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).\n- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).\n- powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).\n- powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).\n- powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).\n- powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).\n- powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).\n- powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).\n- powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup\u0027 (bnc#1012382).\n- powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).\n- powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).\n- powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).\n- powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).\n- powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).\n- powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).\n- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc#1053043).\n- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc#1053043).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc#1053043).\n- powerpc/process: Fix sparse address space warnings (bsc#1066223).\n- powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1019695 bsc#1019696).\n- qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).\n- qmi_wwan: add Olicard 600 (bnc#1012382).\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bnc#1012382).\n- rsi: improve kernel thread handling to fix kernel panic (bnc#1012382).\n- rtc: da9063: set uie_unsupported when relevant (bnc#1012382).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).\n- s390/3270: fix lockdep false positive on view-\u003elock (bnc#1012382).\n- s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).\n- s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (git-fixes).\n- sched/fair: Do not re-read -\u003eh_load_next during hierarchical load calculation (bnc#1012382).\n- sched/fair: Limit sched_cfs_period_timer() loop to avoid hard lockup (bnc#1012382).\n- sched/numa: Fix a possible divide-by-zero (bnc#1012382).\n- sched: Add sched_smt_active() (bnc#1012382).\n- scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c (bnc#1012382).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).\n- scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).\n- scsi: megaraid_sas: return error when create DMA pool failed (bnc#1012382).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).\n- scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).\n- scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).\n- scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (bnc#1012382).\n- selftests/net: correct the return value for run_netsocktests (bnc#1012382).\n- selinux: never allow relabeling on context mounts (bnc#1012382).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bnc#1012382).\n- slip: make slhc_free() silently accept an error pointer (bnc#1012382).\n- soc/tegra: fuse: Fix illegal free of IO base address (bnc#1012382).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bnc#1012382).\n- staging: comedi: ni_usb6501: Fix possible double-free of -\u003eusb_rx_buf (bnc#1012382).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bnc#1012382).\n- staging: comedi: vmk80xx: Fix possible double-free of -\u003eusb_rx_buf (bnc#1012382).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bnc#1012382).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).\n- staging: iio: adt7316: fix the dac read calculation (bnc#1012382).\n- staging: iio: adt7316: fix the dac write calculation (bnc#1012382).\n- supported.conf: add lib/crc64 because bcache uses it\n- sysctl: handle overflow for file-max (bnc#1012382).\n- tcp: Ensure DCTCP reacts to losses (bnc#1012382).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (bnc#1012382).\n- team: fix possible recursive locking when add slaves (bnc#1012382).\n- thermal/int340x_thermal: Add additional UUIDs (bnc#1012382).\n- thermal/int340x_thermal: fix mode setting (bnc#1012382).\n- timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: handle the err returned from cmd header function (bnc#1012382).\n- tools lib traceevent: Fix buffer overflow in arg_eval (bnc#1012382).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools/power turbostat: return the exit status of a command (bnc#1012382).\n- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bnc#1012382).\n- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bnc#1012382).\n- trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- tracing: kdb: Fix ftdump to not sleep (bnc#1012382).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty/serial: atmel: Add is_half_duplex helper (bnc#1012382).\n- tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped (bnc#1012382).\n- tty: increase the default flip buffer limit to 2*640K (bnc#1012382).\n- tty: ldisc: add sysctl to prevent autoloading of ldiscs (bnc#1012382).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).\n- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n- usb: chipidea: Grab the (legacy) USB PHY by phandle first (bnc#1012382).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).\n- usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).\n- usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).\n- usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).\n- usb: u132-hcd: fix resource leak (bnc#1012382).\n- usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (bnc#1012382).\n- usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).\n- vfio/pci: use correct format characters (bnc#1012382).\n- vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).\n- vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bnc#1012382).\n- x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).\n- x86/MCE: Save microcode revision in machine check records (bnc#1012382).\n- x86/bugs: Add AMD\u0027s SPEC_CTRL MSR usage (bnc#1012382).\n- x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).\n- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).\n- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).\n- x86/build: Mark per-CPU symbols as absolute explicitly for LLD (bnc#1012382).\n- x86/build: Specify elf_i386 linker emulation explicitly for i386 objects (bnc#1012382).\n- x86/cpu/bugs: Use __initconst for \u0027const\u0027 init data (bnc#1012382).\n- x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors (bnc#1012382).\n- x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).\n- x86/hpet: Prevent potential NULL pointer dereference (bnc#1012382).\n- x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error (bnc#1012382).\n- x86/kprobes: Verify stack frame on kretprobe (bnc#1012382).\n- x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).\n- x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).\n- x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).\n- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).\n- x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).\n- x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).\n- x86/speculataion: Mark command line parser data __initdata (bnc#1012382).\n- x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).\n- x86/speculation/mds: Fix comment (bnc#1012382).\n- x86/speculation/mds: Fix documentation typo (bnc#1012382).\n- x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).\n- x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).\n- x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).\n- x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).\n- x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).\n- x86/speculation: Disable STIBP when enhanced IBRS is in use (bnc#1012382).\n- x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).\n- x86/speculation: Mark string arrays const correctly (bnc#1012382).\n- x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() (bnc#1012382).\n- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).\n- x86/speculation: Prepare for conditional IBPB in switch_mm() (bnc#1012382).\n- x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).\n- x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).\n- x86/speculation: Provide IBPB always command line options (bnc#1012382).\n- x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation (bnc#1012382).\n- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).\n- x86/speculation: Rename SSBD update functions (bnc#1012382).\n- x86/speculation: Reorder the spec_v2 code (bnc#1012382).\n- x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).\n- x86/speculation: Split out TIF update (bnc#1012382).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bnc#1012382 bsc#1112178).\n- x86/speculation: Support Enhanced IBRS on future CPUs (bnc#1012382).\n- x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).\n- x86/speculation: Update the TIF_SSBD comment (bnc#1012382).\n- x86/vdso: Drop implicit common-page-size linker flag (bnc#1012382).\n- x86/vdso: Pass --eh-frame-hdr to the linker (git-fixes).\n- x86: vdso: Use $LD instead of $CC to link (bnc#1012382).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xen: Prevent buffer overflow in privcmd ioctl (bnc#1012382).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xsysace: Fix error handling in ace_setup (bnc#1012382).\n- xtensa: fix return_address (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1527,SUSE-SLE-SERVER-12-SP3-2019-1527",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1527-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1527-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1527-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1005780",
"url": "https://bugzilla.suse.com/1005780"
},
{
"category": "self",
"summary": "SUSE Bug 1005781",
"url": "https://bugzilla.suse.com/1005781"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1019696",
"url": "https://bugzilla.suse.com/1019696"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1085539",
"url": "https://bugzilla.suse.com/1085539"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1100132",
"url": "https://bugzilla.suse.com/1100132"
},
{
"category": "self",
"summary": "SUSE Bug 1106110",
"url": "https://bugzilla.suse.com/1106110"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1106929",
"url": "https://bugzilla.suse.com/1106929"
},
{
"category": "self",
"summary": "SUSE Bug 1108293",
"url": "https://bugzilla.suse.com/1108293"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1116803",
"url": "https://bugzilla.suse.com/1116803"
},
{
"category": "self",
"summary": "SUSE Bug 1117562",
"url": "https://bugzilla.suse.com/1117562"
},
{
"category": "self",
"summary": "SUSE Bug 1119086",
"url": "https://bugzilla.suse.com/1119086"
},
{
"category": "self",
"summary": "SUSE Bug 1120642",
"url": "https://bugzilla.suse.com/1120642"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120885",
"url": "https://bugzilla.suse.com/1120885"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1125580",
"url": "https://bugzilla.suse.com/1125580"
},
{
"category": "self",
"summary": "SUSE Bug 1126040",
"url": "https://bugzilla.suse.com/1126040"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131543",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1132212",
"url": "https://bugzilla.suse.com/1132212"
},
{
"category": "self",
"summary": "SUSE Bug 1132374",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133874",
"url": "https://bugzilla.suse.com/1133874"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134338",
"url": "https://bugzilla.suse.com/1134338"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134564",
"url": "https://bugzilla.suse.com/1134564"
},
{
"category": "self",
"summary": "SUSE Bug 1134565",
"url": "https://bugzilla.suse.com/1134565"
},
{
"category": "self",
"summary": "SUSE Bug 1134566",
"url": "https://bugzilla.suse.com/1134566"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1135013",
"url": "https://bugzilla.suse.com/1135013"
},
{
"category": "self",
"summary": "SUSE Bug 1135014",
"url": "https://bugzilla.suse.com/1135014"
},
{
"category": "self",
"summary": "SUSE Bug 1135015",
"url": "https://bugzilla.suse.com/1135015"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135878",
"url": "https://bugzilla.suse.com/1135878"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136448",
"url": "https://bugzilla.suse.com/1136448"
},
{
"category": "self",
"summary": "SUSE Bug 1136449",
"url": "https://bugzilla.suse.com/1136449"
},
{
"category": "self",
"summary": "SUSE Bug 1136451",
"url": "https://bugzilla.suse.com/1136451"
},
{
"category": "self",
"summary": "SUSE Bug 1136452",
"url": "https://bugzilla.suse.com/1136452"
},
{
"category": "self",
"summary": "SUSE Bug 1136455",
"url": "https://bugzilla.suse.com/1136455"
},
{
"category": "self",
"summary": "SUSE Bug 1136458",
"url": "https://bugzilla.suse.com/1136458"
},
{
"category": "self",
"summary": "SUSE Bug 1136539",
"url": "https://bugzilla.suse.com/1136539"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136575",
"url": "https://bugzilla.suse.com/1136575"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136590",
"url": "https://bugzilla.suse.com/1136590"
},
{
"category": "self",
"summary": "SUSE Bug 1136623",
"url": "https://bugzilla.suse.com/1136623"
},
{
"category": "self",
"summary": "SUSE Bug 1136810",
"url": "https://bugzilla.suse.com/1136810"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137142",
"url": "https://bugzilla.suse.com/1137142"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 843419",
"url": "https://bugzilla.suse.com/843419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4343 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:16:12Z",
"generator": {
"date": "2019-06-17T17:16:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1527-1",
"initial_release_date": "2019-06-17T17:16:12Z",
"revision_history": [
{
"date": "2019-06-17T17:16:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.4.180-4.31.1.noarch",
"product": {
"name": "kernel-devel-azure-4.4.180-4.31.1.noarch",
"product_id": "kernel-devel-azure-4.4.180-4.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.4.180-4.31.1.noarch",
"product": {
"name": "kernel-source-azure-4.4.180-4.31.1.noarch",
"product_id": "kernel-source-azure-4.4.180-4.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.4.180-4.31.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.4.180-4.31.1.x86_64",
"product_id": "dlm-kmp-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.4.180-4.31.1.x86_64",
"product_id": "gfs2-kmp-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-azure-4.4.180-4.31.1.x86_64",
"product_id": "kernel-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-azure-base-4.4.180-4.31.1.x86_64",
"product_id": "kernel-azure-base-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.4.180-4.31.1.x86_64",
"product_id": "kernel-azure-devel-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.4.180-4.31.1.x86_64",
"product_id": "kernel-azure-extra-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-4.4.180-4.31.1.x86_64",
"product_id": "kernel-azure-kgraft-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.4.180-4.31.1.x86_64",
"product_id": "kernel-syms-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.4.180-4.31.1.x86_64",
"product_id": "kselftests-kmp-azure-4.4.180-4.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.4.180-4.31.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.4.180-4.31.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.4.180-4.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-base-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.4.180-4.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch"
},
"product_reference": "kernel-devel-azure-4.4.180-4.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.4.180-4.31.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch"
},
"product_reference": "kernel-source-azure-4.4.180-4.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-base-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.4.180-4.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch"
},
"product_reference": "kernel-devel-azure-4.4.180-4.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.4.180-4.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch"
},
"product_reference": "kernel-source-azure-4.4.180-4.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.4.180-4.31.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.4.180-4.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4343"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4343",
"url": "https://www.suse.com/security/cve/CVE-2013-4343"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2013-4343",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "external",
"summary": "SUSE Bug 839965 for CVE-2013-4343",
"url": "https://bugzilla.suse.com/839965"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2013-4343"
},
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.180-4.31.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.180-4.31.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.180-4.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:16:12Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1535-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will\nfragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an\nexpensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)\n- CVE-2019-11487: The Linux kernel allowed page reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM existed. It could have occured with FUSE requests. (bnc#1133190)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in i915 Graphics for Linux may have allowed an authenticated user to potentially enable escalation of privilege via local access. (bnc#1135278)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a hidPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)\n- CVE-2019-10124: An attacker could exploit an issue in the hwpoison implementation to cause a denial of service (BUG). (bsc#1130699)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- acpi / utils: Drop reference in test for device presence (bsc#1051510).\n- acpi: button: reinitialize button state upon resume (bsc#1051510).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpica: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- acpica: Namespace: remove address node from global list after method termination (bsc#1051510).\n- alsa: core: Do not refer to snd_cards array directly (bsc#1051510).\n- alsa: emu10k1: Drop superfluous id-uniquification behavior (bsc#1051510).\n- alsa: hda - Register irq handler after the chip initialization (bsc#1051510).\n- alsa: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- alsa: hda/hdmi - Consider eld_valid when reporting jack event (bsc#1051510).\n- alsa: hda/hdmi - Read the pin sense from register when repolling (bsc#1051510).\n- alsa: hda/realtek - Add new Dell platform for headset mode (bsc#1051510).\n- alsa: hda/realtek - Apply the fixup for ASUS Q325UAR (bsc#1051510).\n- alsa: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- alsa: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: hda/realtek - EAPD turn on later (bsc#1051510).\n- alsa: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- alsa: hda/realtek - Fixed Dell AIO speaker noise (bsc#1051510).\n- alsa: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hdea/realtek - Headset fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- alsa: line6: Avoid polluting led_* namespace (bsc#1051510).\n- alsa: line6: use dynamic buffers (bsc#1051510).\n- alsa: seq: Align temporary re-locking with irqsave version (bsc#1051510).\n- alsa: seq: Correct unlock sequence at snd_seq_client_ioctl_unlock() (bsc#1051510).\n- alsa: seq: Cover unsubscribe_port() in list_mutex (bsc#1051510).\n- alsa: seq: Fix race of get-subscription call vs port-delete ioctls (bsc#1051510).\n- alsa: seq: Protect in-kernel ioctl calls with mutex (bsc#1051510).\n- alsa: seq: Protect racy pool manipulation from OSS sequencer (bsc#1051510).\n- alsa: seq: Remove superfluous irqsave flags (bsc#1051510).\n- alsa: seq: Simplify snd_seq_kernel_client_enqueue() helper (bsc#1051510).\n- alsa: timer: Check ack_list emptiness instead of bit flag (bsc#1051510).\n- alsa: timer: Coding style fixes (bsc#1051510).\n- alsa: timer: Make snd_timer_close() really kill pending actions (bsc#1051510).\n- alsa: timer: Make sure to clear pending ack list (bsc#1051510).\n- alsa: timer: Revert active callback sync check at close (bsc#1051510).\n- alsa: timer: Simplify error path in snd_timer_open() (bsc#1051510).\n- alsa: timer: Unify timer callback process code (bsc#1051510).\n- alsa: usb-audio: Fix a memory leak bug (bsc#1051510).\n- alsa: usb-audio: Handle the error from snd_usb_mixer_apply_create_quirk() (bsc#1051510).\n- alsa: usx2y: fix a double free bug (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_acpi\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- asoc: Intel: avoid Oops if DMA setup fails (bsc#1051510).\n- asoc: RT5677-SPI: Disable 16Bit SPI Transfers (bsc#1051510).\n- asoc: cs4270: Set auto-increment bit for register writes (bsc#1051510).\n- asoc: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- asoc: fix valid stream condition (bsc#1051510).\n- asoc: fsl_esai: Fix missing break in switch statement (bsc#1051510).\n- asoc: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- asoc: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- asoc: hdmi-codec: fix S/PDIF DAI (bsc#1051510).\n- asoc: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- asoc: max98090: Fix restore of DAPM Muxes (bsc#1051510).\n- asoc: nau8810: fix the issue of widget with prefixed name (bsc#1051510).\n- asoc: nau8824: fix the issue of the widget with prefix name (bsc#1051510).\n- asoc: samsung: odroid: Fix clock configuration for 44100 sample rate (bsc#1051510).\n- asoc: stm32: fix sai driver name initialisation (bsc#1051510).\n- asoc: tlv320aic32x4: Fix Common Pins (bsc#1051510).\n- asoc: wm_adsp: Add locking to wm_adsp2_bus_error (bsc#1051510).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bsc#1051510).\n- at76c50x-usb: Do not register led_trigger if usb_register_driver failed (bsc#1051510).\n- audit: fix a memleak caused by auditing load module (bsc#1051510).\n- b43: shut up clang -Wuninitialized variable warning (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: Replace bch_read_string_list() by __sysfs_match_string() (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set io_error_limit (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bsc#1130972).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bsc#1130972).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bsc#1130972).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop bcache device when backing device is offline (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: update comment in sysfs.c (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: check_events: do not bother with events if unsupported (bsc#1110946, bsc#1119843).\n- block: disk_events: introduce event flags (bsc#1110946, bsc#1119843).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bsc#1051510).\n- bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bluetooth: hidp: fix buffer overflow (bsc#1051510).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- brcm80211: potential NULL dereference in brcmf_cfg80211_vndr_cmds_dcmd_handler() (bsc#1051510).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during usb disconnect (bsc#1051510).\n- brcmfmac: fix WARNING during usb disconnect in case of unempty psq (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix race during disconnect when usb completion is in progress (bsc#1051510).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134461).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134459).\n- ceph: only use d_name directly when parent is locked (bsc#1134460).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- clk: rockchip: Fix video codec clocks on rk3288 (bsc#1051510).\n- clk: rockchip: fix wrong clock definitions for rk3328 (bsc#1051510).\n- config: Debug kernel is not supported (bsc#1135492).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- crypto: arm/aes-neonbs - do not access already-freed walk.iv (bsc#1051510).\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: ccm - fix incompatibility between \u0027ccm\u0027 and \u0027ccm_base\u0027 (bsc#1051510).\n- crypto: ccp - Do not free psp_master when PLATFORM_INIT fails (bsc#1051510).\n- crypto: chacha20poly1305 - set cra_name correctly (bsc#1051510).\n- crypto: crct10dif-generic - fix use via crypto_shash_digest() (bsc#1051510).\n- crypto: fips - Grammar s/options/option/, s/to/the/ (bsc#1051510).\n- crypto: gcm - fix incompatibility between \u0027gcm\u0027 and \u0027gcm_base\u0027 (bsc#1051510).\n- crypto: skcipher - do not WARN on unprocessed data after slow walk step (bsc#1051510).\n- crypto: sun4i-ss - Fix invalid calculation of hash end (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() (bsc#1051510).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- dmaengine: axi-dmac: Do not check the number of frames for alignment (bsc#1051510).\n- dmaengine: tegra210-dma: free dma controller in remove() (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- documentation: Add MDS vulnerability documentation (bsc#1135642).\n- documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Fix incorrect mask of mmio 0x22028 in gen8/9 mmio list (bnc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915: Fix I915_EXEC_RING_MASK (bsc#1051510).\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/mediatek: fix possible object reference leak (bsc#1051510).\n- drm/meson: add size and alignment requirements for dumb buffers (bnc#1113722)\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1051510).\n- drm/sun4i: rgb: Change the pixel clock validation check (bnc#1113722)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: net: Fix a typo in the phy-mode list for ethernet bindings (bsc#1129770).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- dwc2: gadget: Fix completed transfer size calculation in DDMA (bsc#1051510).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix rtnh_ok() (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- ghes, EDAC: Fix ghes_edac registration (bsc#1133176).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpio: aspeed: fix a potential NULL pointer dereference (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bsc#1051510).\n- hid: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- hid: input: add mapping for Assistant key (bsc#1051510).\n- hid: input: add mapping for Expose/Overview key (bsc#1051510).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- hid: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- hid: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- hid: logitech: check the return value of create_singlethread_workqueue (bsc#1051510).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon: (f71805f) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pc87427) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwmon: (smsc47b397) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (smsc47m1) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (vt1211) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: Make i2c_unregister_device() NULL-aware (bsc#1108193).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- input: introduce KEY_ASSISTANT (bsc#1051510).\n- input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- intel_th: msu: Fix single mode with IOMMU (bsc#1051510).\n- intel_th: pci: Add Comet Lake support (bsc#1051510).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135006).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135007).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135008).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ipmi: Fix I2C client removal in the SSIF driver (bsc#1108193).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1051510).\n- ipmi_ssif: Remove duplicate NULL check (bsc#1108193).\n- ipmi_ssif: update patch reference for ipmi_ssif fix (bsc#1135120)\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: fix stats update from local clients (git-fixes).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kABI workaround for removed usb_interface.pm_usage_cnt field (bsc#1051510).\n- kABI workaround for snd_seq_kernel_client_enqueue() API changes (bsc#1051510).\n- kABI: protect dma-mapping.h include (kabi).\n- kABI: protect ip_options_rcv_srr (kabi).\n- kABI: protect struct mlx5_td (kabi).\n- kABI: protect struct pci_dev (kabi).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv (bsc#1051510).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bsc#1051510).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128904 LTC#176078).\n- kvm: Fix UAF in nested posted interrupt processing (bsc#1134199).\n- kvm: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- kvm: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- kvm: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- kvm: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- kvm: PPC: Remove redundand permission bits removal (bsc#1061840).\n- kvm: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- kvm: PPC: Validate all tces before updating tables (bsc#1061840).\n- kvm: VMX: Zero out *all* general purpose registers after VM-Exit (bsc#1134202).\n- kvm: nVMX: Clear reserved bits of #DB exit qualification (bsc#1134200).\n- kvm: nVMX: restore host state in nested_vmx_vmexit for VMFail (bsc#1134201).\n- kvm: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- kvm: s390: provide io interrupt kvm_stat (bsc#1136206).\n- kvm: s390: use created_vcpus in more places (bsc#1136206).\n- kvm: s390: vsie: fix 8k check for the itdba (bsc#1136206).\n- kvm: x86: Always use 32-bit SMRAM save state for 32-bit kernels (bsc#1134203).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bsc#1134204).\n- kvm: x86: svm: make sure NMI is injected after nmi_singlestep (bsc#1134205).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- leds: avoid races with workqueue (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bsc#1051510).\n- linux/kernel.h: Use parentheses around argument in u64_to_user_ptr() (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- md: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cx18: update *pos correctly in cx18_read_pos() (bsc#1051510).\n- media: cx23885: check allocation return (bsc#1051510).\n- media: davinci-isif: avoid uninitialized variable use (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: ivtv: update *pos correctly in ivtv_read_pos() (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: fix unbalanced mutex_lock/unlock (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1129770).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: serial_ir: Fix use-after-free in serial_ir_init_module (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: vivid: use vfree() instead of kfree() for dev-\u003ebitmap_cap (bsc#1051510).\n- media: wl128x: Fix an error code in fm_download_firmware() (bsc#1051510).\n- media: wl128x: prevent two potential buffer overflows (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mm: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm: hwpoison: fix thp split handing in soft_offline_in_use_page() (bsc#1130699, CVE-2019-10124).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: core: fix possible use after free of host (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mtd: docg3: Fix passing zero to \u0027PTR_ERR\u0027 warning in doc_probe_device (bsc#1051510).\n- mtd: docg3: fix a possible memory leak of mtd-\u003ename (bsc#1051510).\n- mtd: nand: omap: Fix comment in platform data using wrong Kconfig symbol (bsc#1051510).\n- mtd: part: fix incorrect format specifier for an unsigned long long (bsc#1051510).\n- mtd: spi-nor: intel-spi: Avoid crossing 4K address boundary on read/write (bsc#1129770).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix mem leak in mwifiex_tm_cmd (bsc#1051510).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- mwifiex: prevent an array overflow (bsc#1051510).\n- mwl8k: Fix rate_idx underflow (bsc#1051510).\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: avoid skb_warn_bad_offload on IS_ERR (git-fixes).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: legacy: do not unmask port bitmaps (git-fixes).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: bridge: ebt_among: add missing match size checks (git-fixes).\n- netfilter: bridge: ebt_among: add more missing match size checks (git-fixes).\n- netfilter: drop template ct when conntrack is skipped (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_socket: Fix out of bounds access in nf_sk_lookup_slow_v{4,6} (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- nfs add module option to limit NFSv4 minor version (jsc#PM-231).\n- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).\n- nfs: Enable NFSv4.2 support - jsc@PM-231\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme-multipath: avoid crash on invalid subsystem cntlid enumeration (bsc#1129273).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393) We need to turn on OCFS2_FS_STATS kernel configuration setting, to fix bsc#1134393.\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- omapfb: add missing of_node_put after of_device_is_available (bsc#1051510).\n- openvswitch: add seqadj extension when NAT is used (bsc#1051510).\n- openvswitch: fix flow actions reallocation (bsc#1051510).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packet: validate msg_namelen in send directly (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- pci: Factor out pcie_retrain_link() function (git-fixes).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- pci: Work around Pericom pcie-to-pci bridge Retrain Link erratum (git-fixes).\n- pci: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- phy: sun4i-usb: Make sure to disable PHY0 passby for peripheral mode (bsc#1051510).\n- platform/x86: alienware-wmi: printing the wrong error code (bsc#1051510).\n- platform/x86: dell-rbtn: Add missing #include (bsc#1051510).\n- platform/x86: intel_pmc_ipc: adding error handling (bsc#1051510).\n- platform/x86: intel_punit_ipc: Revert \u0027Fix resource ioremap warning\u0027 (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Drop __initconst on dmi table (bsc#1051510).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bsc#1051510).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- powerpc/64s: Fix page table fragment refcount race vs speculative references (bsc#1131326, bsc#1108937).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc/mm/radix: Display if mappings are exec or not (bsc#1055186, git-fixes).\n- powerpc/mm/radix: Prettify mapped memory range print out (bsc#1055186, git-fixes).\n- powerpc/mm: Fix page table dump to work on Radix (bsc#1055186, git-fixes).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- proc/kcore: do not bounds check against address 0 (bsc#1051510).\n- proc/sysctl: fix return error for proc_doulongvec_minmax() (bsc#1051510).\n- proc: revalidate kernel thread inodes to root:root (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- pwm: Fix deadlock warning when removing PWM device (bsc#1051510).\n- pwm: meson: Consider 128 a valid pre-divider (bsc#1051510).\n- pwm: meson: Do not disable PWM when setting duty repeatedly (bsc#1051510).\n- pwm: meson: Use the spin-lock only to protect register modifications (bsc#1051510).\n- pwm: tiehrpwm: Update shadow register for disabling PWMs (bsc#1051510).\n- qla2xxx: allow irqbalance control in non-MQ mode (bsc#1128979).\n- qla2xxx: always allocate qla_tgt_wq (bsc#1131451).\n- qmi_wwan: add Olicard 600 (bsc#1051510).\n- rdma/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- rdma/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- regulator: tps65086: Fix tps65086_ldoa1_ranges for selector 0xB (bsc#1051510).\n- rt2x00: do not increment sequence number while re-transmitting (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtlwifi: rtl8723ae: Fix missing break in switch statement (bsc#1051510).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bsc#1051510).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (bsc#1051510).\n- sc16is7xx: put err_spi and err_i2c into correct #ifdef (bsc#1051510).\n- scripts/bugzilla-create: Set \u0027Proactive-Upstream-Fix\u0027 keyword\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts: override locale from environment when running recordmcount.pl (bsc#1134354).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Add new FC-NVMe enable BIT to enable FC-NVMe feature (bsc#1130579).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show (bsc#1132044).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: qla2xxx: fix error message on qla2400 (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- sctp: only update outstanding_bytes for transmitted queue when doing prsctp_prune (git-fixes).\n- sctp: set frag_point in sctp_setsockopt_maxseg correctly` (git-fixes).\n- selinux: use kernel linux/socket.h for genheaders and mdp (bsc#1134810).\n- serial: 8250_pxa: honor the port number from devicetree (bsc#1051510).\n- serial: ar933x_uart: Fix build failure with disabled console (bsc#1051510).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- snd: re-export snd_cards for kABI compatibility (bsc#1051510).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- soc/tegra: pmc: Drop locking from tegra_powergate_is_powered() (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: a3700: Clear DATA_OUT when performing a read (bsc#1051510).\n- spi: bcm2835aux: fix driver to not allow 65535 (=-1) cs-gpios (bsc#1051510).\n- spi: bcm2835aux: setup gpio-cs to output and correct level during setup (bsc#1051510).\n- spi: bcm2835aux: warn in dmesg that native cs is not really supported (bsc#1051510).\n- spi: rspi: Fix sequencer reset during initialization (bsc#1051510).\n- ssb: Fix possible NULL pointer dereference in ssb_host_pcmcia_exit (bsc#1051510).\n- staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc (bsc#1051510).\n- staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- stm class: Fix an endless loop in channel allocation (bsc#1051510).\n- stm class: Fix channel free in stm output free path (bsc#1051510).\n- stm class: Prevent division by zero (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- supported.conf: Add openvswitch to kernel-default-base (bsc#1124839).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal/int340x_thermal: Add additional UUIDs (bsc#1051510).\n- thermal/int340x_thermal: fix mode setting (bsc#1051510).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tty: increase the default flip buffer limit to 2*640K (bsc#1051510).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: pty: Fix race condition between release_one_tty and pty_write (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty: serial_core, add -\u003einstall (bnc#1129693).\n- tty: vt.c: Fix TIOCL_BLANKSCREEN console blanking if blankinterval == 0 (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- usb-storage: Set virt_boundary_mask to avoid SG overflows (bsc#1051510).\n- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usb: cdc-acm: fix unthrottle races (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bsc#1051510).\n- usb: core: Fix unterminated string returned by usb_string() (bsc#1051510).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bsc#1051510).\n- usb: gadget: net2272: Fix net2272_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix net2280_dequeue() (bsc#1051510).\n- usb: gadget: net2280: Fix overrun of OUT messages (bsc#1051510).\n- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- usb: rio500: refuse more than one device at a time (bsc#1051510).\n- usb: serial: f81232: fix interrupt worker not stop (bsc#1051510).\n- usb: serial: fix unthrottle races (bsc#1051510).\n- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- usb: u132-hcd: fix resource leak (bsc#1051510).\n- usb: usb251xb: fix to avoid potential NULL pointer dereference (bsc#1051510).\n- usb: usbip: fix isoc packet num validation in get_pipe (bsc#1051510).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bsc#1051510).\n- usb: yurex: Fix protection fault after device removal (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vfio/mdev: Avoid release parent reference during error path (bsc#1051510).\n- vfio/mdev: Fix aborting mdev child device removal if one fails (bsc#1051510).\n- vfio/pci: use correct format characters (bsc#1051510).\n- vfio_pci: Enable memory accesses before calling pci_map_rom (bsc#1051510).\n- vhost/vsock: fix reset orphans race with close timeout (bsc#1051510).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- virtio-blk: limit number of hw queues by nr_cpu_ids (bsc#1051510).\n- virtio: Honour \u0027may_reduce_num\u0027 in vring_create_virtqueue (bsc#1051510).\n- virtio_pci: fix a NULL pointer reference in vp_del_vqs (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vsock/virtio: fix kernel panic after device hot-unplug (bsc#1051510).\n- vsock/virtio: fix kernel panic from virtio_transport_reset_no_sock (bsc#1051510).\n- vsock/virtio: reset connected sockets on device removal (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xen/pciback: Do not disable pci_COMMAND on pci device reset (bsc#1065600).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: Fix stack-out-of-bounds read on socket policy lookup (git-fixes).\n- xfrm: Return error on unknown encap_type in init_state (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: detect and fix bad summary counts at mount (bsc#1114427).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: kill meaningless variable \u0027zero\u0027 (bsc#1106011).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: prepare xfs_break_layouts() for another layout type (bsc#1106011).\n- xfs: prepare xfs_break_layouts() to be called with XFS_MMAPLOCK_EXCL (bsc#1106011).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove xfs_zero_range (bsc#1106011).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1535,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1535,SUSE-SLE-Module-Public-Cloud-15-2019-1535",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1535-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1535-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1535-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106011",
"url": "https://bugzilla.suse.com/1106011"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108193",
"url": "https://bugzilla.suse.com/1108193"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1108937",
"url": "https://bugzilla.suse.com/1108937"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119843",
"url": "https://bugzilla.suse.com/1119843"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1124839",
"url": "https://bugzilla.suse.com/1124839"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1128979",
"url": "https://bugzilla.suse.com/1128979"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129273",
"url": "https://bugzilla.suse.com/1129273"
},
{
"category": "self",
"summary": "SUSE Bug 1129497",
"url": "https://bugzilla.suse.com/1129497"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130579",
"url": "https://bugzilla.suse.com/1130579"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131326",
"url": "https://bugzilla.suse.com/1131326"
},
{
"category": "self",
"summary": "SUSE Bug 1131451",
"url": "https://bugzilla.suse.com/1131451"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1132044",
"url": "https://bugzilla.suse.com/1132044"
},
{
"category": "self",
"summary": "SUSE Bug 1133176",
"url": "https://bugzilla.suse.com/1133176"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134199",
"url": "https://bugzilla.suse.com/1134199"
},
{
"category": "self",
"summary": "SUSE Bug 1134200",
"url": "https://bugzilla.suse.com/1134200"
},
{
"category": "self",
"summary": "SUSE Bug 1134201",
"url": "https://bugzilla.suse.com/1134201"
},
{
"category": "self",
"summary": "SUSE Bug 1134202",
"url": "https://bugzilla.suse.com/1134202"
},
{
"category": "self",
"summary": "SUSE Bug 1134203",
"url": "https://bugzilla.suse.com/1134203"
},
{
"category": "self",
"summary": "SUSE Bug 1134204",
"url": "https://bugzilla.suse.com/1134204"
},
{
"category": "self",
"summary": "SUSE Bug 1134205",
"url": "https://bugzilla.suse.com/1134205"
},
{
"category": "self",
"summary": "SUSE Bug 1134354",
"url": "https://bugzilla.suse.com/1134354"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134459",
"url": "https://bugzilla.suse.com/1134459"
},
{
"category": "self",
"summary": "SUSE Bug 1134460",
"url": "https://bugzilla.suse.com/1134460"
},
{
"category": "self",
"summary": "SUSE Bug 1134461",
"url": "https://bugzilla.suse.com/1134461"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134810",
"url": "https://bugzilla.suse.com/1134810"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1135006",
"url": "https://bugzilla.suse.com/1135006"
},
{
"category": "self",
"summary": "SUSE Bug 1135007",
"url": "https://bugzilla.suse.com/1135007"
},
{
"category": "self",
"summary": "SUSE Bug 1135008",
"url": "https://bugzilla.suse.com/1135008"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:22:41Z",
"generator": {
"date": "2019-06-17T17:22:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1535-1",
"initial_release_date": "2019-06-17T17:22:41Z",
"revision_history": [
{
"date": "2019-06-17T17:22:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-5.30.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-5.30.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-5.30.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-5.30.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-5.30.1.noarch",
"product_id": "kernel-source-azure-4.12.14-5.30.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-5.30.1.x86_64",
"product_id": "kernel-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-5.30.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-5.30.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-5.30.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-4.12.14-5.30.1.x86_64",
"product_id": "kernel-azure-livepatch-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-5.30.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-5.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-4.12.14-5.30.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-4.12.14-5.30.1.x86_64",
"product_id": "reiserfs-kmp-azure-4.12.14-5.30.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-5.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-5.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-5.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-5.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-5.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-5.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-5.30.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-5.30.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-5.30.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-5.30.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-5.30.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-5.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.30.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.30.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:22:41Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1924-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)\n\nThis update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1924,SUSE-SLE-SAP-12-SP1-2019-1923,SUSE-SLE-SAP-12-SP1-2019-1924,SUSE-SLE-SAP-12-SP1-2019-1925,SUSE-SLE-SAP-12-SP1-2019-1926,SUSE-SLE-SERVER-12-SP1-2019-1923,SUSE-SLE-SERVER-12-SP1-2019-1924,SUSE-SLE-SERVER-12-SP1-2019-1925,SUSE-SLE-SERVER-12-SP1-2019-1926",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1924-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1924-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191924-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1924-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE Bug 1140747",
"url": "https://bugzilla.suse.com/1140747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)",
"tracking": {
"current_release_date": "2019-07-23T07:56:38Z",
"generator": {
"date": "2019-07-23T07:56:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1924-1",
"initial_release_date": "2019-07-23T07:56:38Z",
"revision_history": [
{
"date": "2019-07-23T07:56:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-23T07:56:38Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-10-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-23T07:56:38Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
}
]
}
suse-su-2019:1671-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.121-92_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1671,SUSE-SLE-Live-Patching-12-SP3-2019-1655,SUSE-SLE-Live-Patching-12-SP3-2019-1657,SUSE-SLE-Live-Patching-12-SP3-2019-1658,SUSE-SLE-Live-Patching-12-SP3-2019-1659,SUSE-SLE-Live-Patching-12-SP3-2019-1660,SUSE-SLE-Live-Patching-12-SP3-2019-1661,SUSE-SLE-Live-Patching-12-SP3-2019-1662,SUSE-SLE-Live-Patching-12-SP3-2019-1663,SUSE-SLE-Live-Patching-12-SP3-2019-1673,SUSE-SLE-Live-Patching-12-SP3-2019-1676,SUSE-SLE-Live-Patching-12-SP3-2019-1677,SUSE-SLE-Live-Patching-12-SP3-2019-1678,SUSE-SLE-Live-Patching-12-SP4-2019-1649,SUSE-SLE-Live-Patching-12-SP4-2019-1675,SUSE-SLE-SAP-12-SP2-2019-1653,SUSE-SLE-SAP-12-SP2-2019-1654,SUSE-SLE-SAP-12-SP2-2019-1656,SUSE-SLE-SAP-12-SP2-2019-1669,SUSE-SLE-SAP-12-SP2-2019-1670,SUSE-SLE-SAP-12-SP2-2019-1671,SUSE-SLE-SAP-12-SP2-2019-1672,SUSE-SLE-SERVER-12-SP2-2019-1653,SUSE-SLE-SERVER-12-SP2-2019-1654,SUSE-SLE-SERVER-12-SP2-2019-1656,SUSE-SLE-SERVER-12-SP2-2019-1669,SUSE-SLE-SERVER-12-SP2-2019-1670,SUSE-SLE-SERVER-12-SP2-2019-1671,SUSE-SLE-SERVER-12-SP2-2019-1672",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1671-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1671-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191671-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1671-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)",
"tracking": {
"current_release_date": "2019-06-21T16:11:09Z",
"generator": {
"date": "2019-06-21T16:11:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1671-1",
"initial_release_date": "2019-06-21T16:11:09Z",
"revision_history": [
{
"date": "2019-06-21T16:11:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"product_id": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"product_id": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:09Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:09Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:09Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_138-94_39-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_140-94_42-default-9-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_143-94_47-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_155-94_50-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_57-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_61-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_156-94_64-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_69-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_162-94_72-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_178-94_91-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-2-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:11:09Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1588-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.12.14-195 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1588,SUSE-SLE-Module-Live-Patching-15-2019-1578,SUSE-SLE-Module-Live-Patching-15-2019-1580,SUSE-SLE-Module-Live-Patching-15-SP1-2019-1588",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1588-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1588-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1588-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)",
"tracking": {
"current_release_date": "2019-06-20T17:49:38Z",
"generator": {
"date": "2019-06-20T17:49:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1588-1",
"initial_release_date": "2019-06-20T17:49:38Z",
"revision_history": [
{
"date": "2019-06-20T17:49:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-195-default-2-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-195-default-2-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:49:38Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:49:38Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:49:38Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-195-default-2-4.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-2-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_17-default-2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-20T17:49:38Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:2450-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise Server 12 SP4 Realtime Kernel was updated to fix bugs and security issues.\n\nSecurity issues fixed:\n\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c. There was an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2018-16871: A NULL pointer dereference due to an anomalized NFS message sequence was fixed. (bnc#1137103).\n- CVE-2018-20836: There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n- CVE-2018-20855: An issue was discovered in create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace (bsc#1143045).\n- CVE-2019-11810: A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free (bsc#1134399).\n- CVE-2019-14283: The function set_geometry in drivers/block/floppy.c did not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143191).\n- CVE-2019-14284: The drivers/block/floppy.c allowed a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default (bsc#1143189).\n- CVE-2019-13631: In parse_hid_report_descriptor in drivers/input/tablet/gtco.c, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages (bsc#1142023).\n- CVE-2019-1125: Enable Spectre v1 mitigations for SWAPGS (bsc#1139358).\n- CVE-2019-10126: A flaw was found in the Linux kernel that might lead to memory corruption in the marvell mwifiex driver. (bnc#1136935)\n- CVE-2019-10638: In the Linux kernel, a device could be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (bnc#1140575)\n- CVE-2019-10639: The Linux kernel allowed Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it was possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic was sent to multiple destination IP addresses, it was possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key was extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visited the attacker\u0027s web page, then WebRTC or gQUIC could be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable because IP ID generation was changed to have a dependency on an address associated with a network namespace. (bnc#1140577)\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586)\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11599: The coredump implementation in the Linux kernel did not use locking or other mechanisms to prevent vma layout or vma flags changes while it ran, which allowed local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c. (bnc#1133738)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it. (bnc#1136598)\n- CVE-2019-12456: a double-fetch bug in _ctl_ioctl_main() could allow local users to create a denial of service (bsc#1136922).\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This used to affect nfc_llcp_build_gb in net/nfc/llcp_core.c. (bsc#1138293)\n- CVE-2019-12819: The function __mdiobus_register() called put_device(), which triggered a fixed_mdio_bus_init use-after-free. This would cause a denial of service. (bsc#1138291)\n- CVE-2019-13648: In the Linux kernel on the powerpc platform, when hardware transactional memory was disabled, a local user can cause a denial of service via a sigreturn() system call that sends a crafted signal frame. (bnc#1142265)\n\nOther issues fixed:\n\n- 6lowpan: Off by one handling -\u003enexthdr (bsc#1051510).\n- Abort file_remove_privs() for non-reg. files (bsc#1140888).\n- acpi: Add Hygon Dhyana support (fate#327735).\n- acpi: fix menuconfig presentation of acpi submenu (bsc#1117158).\n- acpi/nfit: Always dump _DSM output payload (bsc#1142351).\n- acpi: PM: Allow transitions to D0 to occur in special cases (bsc#1051510).\n- acpi: PM: Avoid evaluating _PS3 on transitions from D3hot to D3cold (bsc#1051510).\n- acpi / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- Add back sibling paca poiter to paca (bsc#1055117).\n- added De0-Nanos-SoC board support (and others based on Altera SOC).\n- Add kernel-subpackage-build.spec (FATE#326579).\n- Add sample kernel-default-base spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- Add support for crct10dif-vpmsum (FATE#327696).\n- Add version information to KLP_SYMBOLS file\n- af_key: unconditionally clone on broadcast (bsc#1051510).\n- af_unix: remove redundant lockdep class (git-fixes).\n- alsa: compress: Be more restrictive about when a drain is allowed (bsc#1051510).\n- alsa: compress: Don\u0027t allow paritial drain operations on capture streams (bsc#1051510).\n- alsa: compress: Fix regression on compressed capture streams (bsc#1051510).\n- alsa: compress: Prevent bypasses of set_params (bsc#1051510).\n- alsa: firewire-lib/fireworks: fix miss detection of received MIDI messages (bsc#1051510).\n- alsa: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- alsa: hda - Add a conexant codec entry to let mute led work (bsc#1051510).\n- alsa: hda - Force polling mode on CNL for fixing codec communication (bsc#1051510).\n- alsa: hda/realtek: Add quirks for several Clevo notebook barebones (bsc#1051510).\n- alsa: hda/realtek: apply ALC891 headset fixup to one Dell machine (bsc#1051510).\n- alsa: hda/realtek - Change front mic location for Lenovo M710q (bsc#1051510).\n- alsa: hda/realtek - Fixed Headphone Mic can\u0027t record on Dell platform (bsc#1051510).\n- alsa: hda/realtek - Headphone Mic can\u0027t record after S3 (bsc#1051510).\n- alsa: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- alsa: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- alsa: line6: Fix a typo (bsc#1051510).\n- alsa: line6: Fix write on zero-sized buffer (bsc#1051510).\n- alsa: line6: Fix wrong altsetting for LINE6_PODHD500_1 (bsc#1051510).\n- alsa: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- alsa: seq: Break too long mutex context in the write loop (bsc#1051510).\n- alsa: seq: fix incorrect order of dest_client/dest_ports arguments (bsc#1051510).\n- alsa: usb-audio: Add quirk for Focusrite Scarlett Solo (bsc#1051510).\n- alsa: usb-audio: Add quirk for MOTU MicroBook II (bsc#1051510).\n- alsa: usb-audio: Cleanup DSD whitelist (bsc#1051510).\n- alsa: usb-audio: Enable .product_name override for Emagic, Unitor 8 (bsc#1051510).\n- alsa: usb-audio: fix sign unintended sign extension on left shifts (bsc#1051510).\n- alsa: usb-audio: Sanity checks for each pipe and EP types (bsc#1051510).\n- apparmor: enforce nullbyte at end of tag string (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing acpi (bsc#1117158).\n- arm64: fix acpi dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files.\n- ASoC : cs4265 : readable register too low (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: cx2072x: fix integer overflow on unsigned int multiply (bsc#1111666).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- ASoC: max98090: remove 24-bit format support if RJ is 0 (bsc#1051510).\n- ASoC: soc-pcm: BE dai needs prepare when pause release after resume (bsc#1051510).\n- ath6kl: add some bounds checking (bsc#1051510).\n- audit: fix a memory leak bug (bsc#1051510).\n- ax25: fix inconsistent lock state in ax25_destroy_timer (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- batman-adv: fix for leaked TVLV handler (bsc#1051510).\n- bcache: acquire bch_register_lock later in cached_dev_detach_finish() (bsc#1140652).\n- bcache: acquire bch_register_lock later in cached_dev_free() (bsc#1140652).\n- bcache: add code comments for journal_read_bucket() (bsc#1140652).\n- bcache: Add comments for blkdev_put() in registration code path (bsc#1140652).\n- bcache: add comments for closure_fn to be called in closure_queue() (bsc#1140652).\n- bcache: add comments for kobj release callback routine (bsc#1140652).\n- bcache: add comments for mutex_lock(\u0026b-\u003ewrite_lock) (bsc#1140652).\n- bcache: add error check for calling register_bdev() (bsc#1140652).\n- bcache: add failure check to run_cache_set() for journal replay (bsc#1140652).\n- bcache: add io error counting in write_bdev_super_endio() (bsc#1140652).\n- bcache: add more error message in bch_cached_dev_attach() (bsc#1140652).\n- bcache: add pendings_cleanup to stop pending bcache device (bsc#1140652).\n- bcache: add reclaimed_journal_buckets to struct cache_set (bsc#1140652).\n- bcache: add return value check to bch_cached_dev_run() (bsc#1140652).\n- bcache: avoid a deadlock in bcache_reboot() (bsc#1140652).\n- bcache: avoid clang -Wunintialized warning (bsc#1140652).\n- bcache: avoid flushing btree node in cache_set_flush() if io disabled (bsc#1140652).\n- bcache: avoid potential memleak of list of journal_replay(s) in the CACHE_SYNC branch of run_cache_set (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE bit in bch_journal() (bsc#1140652).\n- bcache: check CACHE_SET_IO_DISABLE in allocator code (bsc#1140652).\n- bcache: check c-\u003egc_thread by IS_ERR_OR_NULL in cache_set_flush() (bsc#1140652).\n- bcache: Clean up bch_get_congested() (bsc#1140652).\n- bcache: destroy dc-\u003ewriteback_write_wq if failed to create dc-\u003ewriteback_thread (bsc#1140652).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1140652).\n- bcache: don\u0027t set max writeback rate if gc is running (bsc#1140652).\n- bcache: fix a race between cache register and cacheset unregister (bsc#1140652).\n- bcache: fix crashes stopping bcache device before read miss done (bsc#1140652).\n- bcache: fix failure in journal relplay (bsc#1140652).\n- bcache: fix inaccurate result of unused buckets (bsc#1140652).\n- bcache: fix mistaken sysfs entry for io_error counter (bsc#1140652).\n- bcache: fix potential deadlock in cached_def_free() (bsc#1140652).\n- bcache: fix race in btree_flush_write() (bsc#1140652).\n- bcache: fix return value error in bch_journal_read() (bsc#1140652).\n- bcache: fix stack corruption by PRECEDING_KEY() (bsc#1140652).\n- bcache: fix wrong usage use-after-freed on keylist in out_nocoalesce branch of btree_gc_coalesce (bsc#1140652).\n- bcache: ignore read-ahead request failure on backing device (bsc#1140652).\n- bcache: improve bcache_reboot() (bsc#1140652).\n- bcache: improve error message in bch_cached_dev_run() (bsc#1140652).\n- bcache: make bset_search_tree() be more understandable (bsc#1140652).\n- bcache: make is_discard_enabled() static (bsc#1140652).\n- bcache: more detailed error message to bcache_device_link() (bsc#1140652).\n- bcache: move definition of \u0027int ret\u0027 out of macro read_bucket() (bsc#1140652).\n- bcache: never set KEY_PTRS of journal key to 0 in journal_reclaim() (bsc#1140652).\n- bcache: only clear BTREE_NODE_dirty bit when it is set (bsc#1140652).\n- bcache: only set BCACHE_DEV_WB_RUNNING when cached device attached (bsc#1140652).\n- bcache: performance improvement for btree_flush_write() (bsc#1140652).\n- bcache: remove redundant LIST_HEAD(journal) from run_cache_set() (bsc#1140652).\n- bcache: remove retry_flush_write from struct cache_set (bsc#1140652).\n- bcache: remove unncessary code in bch_btree_keys_init() (bsc#1140652).\n- bcache: remove unnecessary prefetch() in bset_search_tree() (bsc#1140652).\n- bcache: remove \u0027XXX:\u0027 comment line from run_cache_set() (bsc#1140652).\n- bcache: return error immediately in bch_journal_replay() (bsc#1140652).\n- bcache: Revert \u0027bcache: fix high CPU occupancy during journal\u0027 (bsc#1140652).\n- bcache: Revert \u0027bcache: free heap cache_set-\u003eflush_btree in bch_journal_free\u0027 (bsc#1140652).\n- bcache: set largest seq to ja-\u003eseq[bucket_index] in journal_read_bucket() (bsc#1140652).\n- bcache: shrink btree node cache after bch_btree_check() (bsc#1140652).\n- bcache: stop writeback kthread and kworker when bch_cached_dev_run() failed (bsc#1140652).\n- bcache: use sysfs_match_string() instead of __sysfs_match_string() (bsc#1140652).\n- be2net: Fix number of Rx queues used for flow hashing (networking-stable-19_06_18).\n- be2net: Signal that the device cannot transmit during reconfiguration (bsc#1127315).\n- be2net: Synchronize be_update_queues with dev_watchdog (bsc#1127315).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- blk-mq: free hw queue\u0027s resource in hctx\u0027s release handler (bsc#1140637).\n- block, bfq: NULL out the bic when it\u0027s no longer valid (bsc#1142359).\n- block: Fix a NULL pointer dereference in generic_make_request() (bsc#1139771).\n- Bluetooth: Fix faulty expression for minimum encryption key size check (bsc#1140328).\n- bnx2x: Prevent load reordering in tx completion processing (bsc#1142868).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (networking-stable-19_05_31).\n- bonding: fix arp_validate toggling in active-backup mode (networking-stable-19_05_14).\n- bonding: Force slave speed check after link state recovery for 802.3ad (bsc#1137584).\n- bpf, x64: fix stack layout of JITed bpf code (bsc#1083647).\n- bpf, x64: save 5 bytes in prologue when ebpf insns came from cbpf (bsc#1083647).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- bridge: Fix error path for kobject_init_and_add() (networking-stable-19_05_14).\n- btrfs: fix race between block group removal and block group allocation (bsc#1143003).\n- Build klp-symbols in kernel devel projects.\n- can: af_can: Fix error path of can_init() (bsc#1051510).\n- can: flexcan: fix timeout when set small bitrate (bsc#1051510).\n- can: purge socket error queue on sock destruct (bsc#1051510).\n- ceph: flush dirty inodes before proceeding with remount (bsc#1140405).\n- cfg80211: fix memory leak of wiphy device name (bsc#1051510).\n- cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css() (bsc#1141478).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- clk: qcom: Fix -Wunused-const-variable (bsc#1051510).\n- clk: rockchip: Don\u0027t yell about bad mmc phases when getting (bsc#1051510).\n- clk: rockchip: Turn on \u0027aclk_dmac1\u0027 for suspend on rk3288 (bsc#1051510).\n- clk: tegra210: fix PLLU and PLLU_OUT1 (bsc#1051510).\n- clk: tegra: Fix PLLM programming on Tegra124+ when PMC overrides divider (bsc#1051510).\n- coredump: fix race condition between collapse_huge_page() and core dumping (bnc#1133738, CVE-2019-11599).\n- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (bsc#1133738, CVE-2019-11599).\n- coresight: etb10: Fix handling of perf mode (bsc#1051510).\n- coresight: etm4x: Add support to enable ETMv4.2 (bsc#1051510).\n- Correct the CVE and bug reference for a floppy security fix (CVE-2019-14284,bsc#1143189)\n- Correct the patch reference tag for scsi fix (bsc#1136922 CVE-2019-12456)\n- cpufreq: acpi-cpufreq: Report if CPU doesn\u0027t support boost technologies (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support (fate#327735).\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ (fate#327735).\n- cpufreq: brcmstb-avs-cpufreq: Fix initial command check (bsc#1051510).\n- cpufreq: brcmstb-avs-cpufreq: Fix types for voltage/frequency (bsc#1051510).\n- cpufreq: check if policy is inactive early in __cpufreq_get() (bsc#1051510).\n- cpufreq: kirkwood: fix possible object reference leak (bsc#1051510).\n- cpufreq/pasemi: fix possible object reference leak (bsc#1051510).\n- cpufreq: pmac32: fix possible object reference leak (bsc#1051510).\n- cpufreq: ppc_cbe: fix possible object reference leak (bsc#1051510).\n- cpufreq: Use struct kobj_attribute instead of struct global_attr (bsc#1051510).\n- cpu/topology: Export die_id (jsc#SLE-5454).\n- crypto: algapi - guard against uninitialized spawn list in crypto_remove_spawns (bsc#1133401).\n- crypto: arm64/sha1-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: arm64/sha2-ce - correct digest for empty data in finup (bsc#1051510).\n- crypto: ccp - Fix 3DES complaint from ccp-crypto module (bsc#1051510).\n- crypto: ccp - fix AES CFB error exposed by new test vectors (bsc#1051510).\n- crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL (bsc#1051510).\n- crypto: ccp - fix the SEV probe in kexec boot path (bsc#1136896).\n- crypto: ccp/gcm - use const time tag comparison (bsc#1051510).\n- crypto: ccp - memset structure fields to zero before reuse (bsc#1051510).\n- crypto: ccp - Validate the the error value used to index error messages (bsc#1051510).\n- crypto: chacha20poly1305 - fix atomic sleep when using async algorithm (bsc#1051510).\n- crypto: cryptd - Fix skcipher instance memory leak (bsc#1051510).\n- crypto: crypto4xx - fix a potential double free in ppc4xx_trng_probe (bsc#1051510).\n- crypto: ghash - fix unaligned memory access in ghash_setkey() (bsc#1051510).\n- crypto: talitos - Align SEC1 accesses to 32 bits boundaries (bsc#1051510).\n- crypto: talitos - check data blocksize in ablkcipher (bsc#1051510).\n- crypto: talitos - fix CTR alg blocksize (bsc#1051510).\n- crypto: talitos - fix max key size for sha384 and sha512 (bsc#1051510).\n- crypto: talitos - HMAC SNOOP NO AFEU mode requires SW icv checking (bsc#1051510).\n- crypto: talitos - properly handle split ICV (bsc#1051510).\n- crypto: talitos - reduce max key size for SEC1 (bsc#1051510).\n- crypto: talitos - rename alternative AEAD algos (bsc#1051510).\n- crypto: user - prevent operating on larval algorithms (bsc#1133401).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#11123080).\n- dax: Fix xarray entry association for mixed mappings (bsc#1140893).\n- device core: Consolidate locking and unlocking of parent and device (bsc#1106383).\n- dmaengine: hsu: Revert \u0027set HSU_CH_MTSR to memory width\u0027 (bsc#1051510).\n- dmaengine: imx-sdma: remove BD_INTR for channel0 (bsc#1051510).\n- dm, dax: Fix detection of DAX support (bsc#1139782).\n- doc: Cope with the deprecation of AutoReporter (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- Documentation: Add MDS vulnerability documentation (bsc#1135642).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- Documentation: DMA-API: fix a function name of max_mapping_size (bsc#1140954).\n- Do not provide kernel-default from kernel-default-base (boo#1132154, bsc#1106751).\n- Do not provide kernel-default-srchash from kernel-default-base.\n- Don\u0027t restrict NFSv4.2 on openSUSE (bsc#1138719).\n- dpaa_eth: fix SG frame cleanup (networking-stable-19_05_14).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- driver core: Establish order of operations for device_add and device_del via bitflag (bsc#1106383).\n- driver core: Probe devices asynchronously instead of the driver (bsc#1106383).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers/base: Introduce kill_device() (bsc#1139865).\n- drivers/base: kABI fixes for struct device_private (bsc#1106383).\n- drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var (bsc#1051510).\n- drivers/rapidio/devices/rio_mport_cdev.c: fix resource leak in error handling path in \u0027rio_dma_transfer()\u0027 (bsc#1051510).\n- drivers/rapidio/rio_cm.c: fix potential oops in riocm_ch_listen() (bsc#1051510).\n- drivers: thermal: tsens: Don\u0027t print error message on -EPROBE_DEFER (bsc#1051510).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu/gfx9: use reset default for PA_SC_FIFO_SIZE (bsc#1051510).\n- drm/arm/hdlcd: Allow a bit of clock tolerance (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/dmc: protect against reading random memory (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: ignore unexpected pvinfo write (bsc#1051510).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/meson: Add support for XBGR8888 \u0026 ABGR8888 formats (bsc#1051510).\n- drm/msm/a3xx: remove TPL1 regs from snapshot (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/nouveau/i2c: Enable i2c pads \u0026 busses during preinit (bsc#1051510).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: Properly adjust to a true clock in adjusted_mode (bsc#1051510).\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- e1000e: start network tx queue only when link is up (bsc#1051510).\n- edac, amd64: Add Hygon Dhyana support (fate#327735).\n- edac/mc: Fix edac_mc_find() in case no device is found (bsc#1114279).\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Don\u0027t mark acpi reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158). \n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- efi/x86/Add missing error handling to old_memmap 1:1 mapping code (CVE-2019-12380,bsc#1136598).\n- ethtool: check the return value of get_regs_len (git-fixes).\n- ethtool: fix potential userspace buffer overflow (networking-stable-19_06_09).\n- ext4: do not delete unlinked inode from orphan list on failed truncate (bsc#1140891).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- Fix kABI breakage by mwifiex security fix (CVE-2019-3846,bsc#1136424).\n- Fix kABI for asus-wmi quirk_entry field addition (bsc#1051510).\n- Fix memory leak in sctp_process_init (networking-stable-19_06_09).\n- floppy: fix div-by-zero in setup_format_params (CVE-2019-14283,bsc#1143191).\n- floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283,bsc#1143191).\n- fork, memcg: fix cached_stacks case (bsc#1134097).\n- fork, memcg: fix crash in free_thread_stack on memcg charge fail (bsc#1134097).\n- fs/ocfs2: fix race in ocfs2_dentry_attach_lock() (bsc#1140889).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bsc#1140887).\n- fs/proc/proc_sysctl.c: fix NULL pointer dereference in put_links (bsc#1140887).\n- ftrace/x86: Remove possible deadlock between register_kprobe() and ftrace_run_update_code() (bsc#1071995 fate#323487).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genirq: Prevent use-after-free and work list corruption (bsc#1051510).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bsc#1051510).\n- genwqe: Prevent an integer overflow in the ioctl (bsc#1051510).\n- git_sort: add crypto maintainer tree.\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: omap: fix lack of irqstatus_raw0 for OMAP4 (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- - HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: correct touch resolution x/y typo (bsc#1051510).\n- HID: wacom: Don\u0027t report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Don\u0027t set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Correct pad syncing (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: only switch the mode on devices with LEDs (bsc#1051510).\n- HID: wacom: generic: read HID_DG_CONTACTMAX from any feature report (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hugetlbfs: dirty pages as they are added to pagecache (git fixes (mm/hugetlbfs)).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (git fixes (mm/hugetlbfs)).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon/coretemp: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- hwmon/coretemp: Support multi-die/package (jsc#SLE-5454).\n- hwmon: (k10temp) 27C Offset needed for Threadripper2 (FATE#327735).\n- hwmon: (k10temp) Add Hygon Dhyana support (FATE#327735).\n- hwmon: (k10temp) Add support for AMD Ryzen w/ Vega graphics (FATE#327735).\n- hwmon: (k10temp) Add support for family 17h (FATE#327735).\n- hwmon: (k10temp) Add support for Stoney Ridge and Bristol Ridge CPUs (FATE#327735).\n- hwmon: (k10temp) Add support for temperature offsets (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 1900X (FATE#327735).\n- hwmon: (k10temp) Add temperature offset for Ryzen 2700X (FATE#327735).\n- hwmon: (k10temp) Correct model name for Ryzen 1600X (FATE#327735).\n- hwmon: (k10temp) Display both Tctl and Tdie (FATE#327735).\n- hwmon: (k10temp) Fix reading critical temperature register (FATE#327735).\n- hwmon: (k10temp) Make function get_raw_temp static (FATE#327735).\n- hwmon: (k10temp) Move chip specific code into probe function (FATE#327735).\n- hwmon: (k10temp) Only apply temperature offset if result is positive (FATE#327735).\n- hwmon: (k10temp) Support all Family 15h Model 6xh and Model 7xh processors (FATE#327735).\n- hwmon: k10temp: Support Threadripper 2920X, 2970WX; simplify offset table (FATE#327735).\n- hwmon: (k10temp) Use API function to access System Management Network (FATE#327735).\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs (FATE#327735).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: acorn: fix i2c warning (bsc#1135642).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- i2c-piix4: Add Hygon Dhyana SMBus support (FATE#327735).\n- IB/mlx5: Fix leaking stack memory to userspace (bsc#1143045 CVE-2018-20855).\n- ibmveth: Update ethtool settings to reflect virtual properties (bsc#1136157, LTC#177197).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inet: switch IP ID generator to siphash (CVE-2019-10638 bsc#1140575).\n- Input: elantech - enable middle button support on 2 ThinkPads (bsc#1051510).\n- Input: gtco - bounds check collection indent level (CVE-2019-13631,bsc#1142023).\n- Input: imx_keypad - make sure keyboard can always wake up system (bsc#1051510).\n- Input: psmouse - fix build error of multiple definition (bsc#1051510).\n- Input: synaptics - enable SMBUS on T480 thinkpad trackpad (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad E480 and E580 (bsc#1051510).\n- Input: tm2-touchkey - acknowledge that setting brightness is a blocking call (bsc#1129770).\n- Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD (bsc#1051510).\n- Install extra rpm scripts for kernel subpackaging (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- intel_th: msu: Fix single mode with disabled IOMMU (bsc#1051510).\n- iommu/amd: Make iommu_disable safer (bsc#1140955).\n- iommu/arm-smmu: Add support for qcom,smmu-v2 variant (bsc#1051510).\n- iommu/arm-smmu: Avoid constant zero in TLBI writes (bsc#1140956).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Don\u0027t disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- iommu/arm-smmu-v3: sync the OVACKFLG to PRIQ consumer register (bsc#1051510).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bsc#1051510).\n- iommu: Fix a leak in iommu_insert_resv_region (bsc#1140957).\n- iommu: Use right function to get group for device (bsc#1140958).\n- iommu/vt-d: Duplicate iommu_resv_region objects per device list (bsc#1140959).\n- iommu/vt-d: Handle PCI bridge RMRR device scopes in intel_iommu_get_resv_regions (bsc#1140960).\n- iommu/vt-d: Handle RMRR with PCI bridge device scopes (bsc#1140961).\n- iommu/vt-d: Introduce is_downstream_to_pci_bridge helper (bsc#1140962).\n- iommu/vt-d: Remove unnecessary rcu_read_locks (bsc#1140964).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: Fix raw socket lookup for local traffic (networking-stable-19_05_14).\n- ipv4/igmp: fix another memory leak in igmpv3_del_delrec() (networking-stable-19_05_31).\n- ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST (networking-stable-19_05_31).\n- ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop (git-fixes).\n- ipv6: Consider sk_bound_dev_if when binding a raw socket to an address (networking-stable-19_05_31).\n- ipv6: fix EFAULT on sendto with icmpv6 and hdrincl (networking-stable-19_06_09).\n- ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero (networking-stable-19_06_18).\n- ipv6: use READ_ONCE() for inet-\u003ehdrincl as in ipv4 (networking-stable-19_06_09).\n- irqchip/gic-v3-its: fix some definitions of inner cacheability attributes (bsc#1051510).\n- irqchip/mbigen: Don\u0027t clear eventid when freeing an MSI (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: don\u0027t crash on invalid RX interrupt (bsc#1051510).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- Kabi fixup blk_mq_register_dev() (bsc#1140637).\n- kabi: handle addition of net::hash_mix (CVE-2019-10639 bsc#1140577).\n- kabi: handle addition of netns_ipv4::ip_id_key (CVE-2019-10638 bsc#1140575).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kabi: x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- kabi: x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- kbuild: use -flive-patching when CONFIG_LIVEPATCH is enabled (bsc#1071995 fate#323487).\n- kernel-binary: fix missing \\\n- kernel-binary: rpm does not support multiline condition\n- kernel-binary: Use -c grep option in klp project detection.\n- kernel: jump label transformation performance (bsc#1137534 bsc#1137535 \t\t\tLTC#178058 LTC#178059).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel-subpackage-spec: Add dummy package to ensure subpackages are rebuilt with kernel update (bsc#1106751).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- KMPs: provide and conflict a kernel version specific KMP name (bsc#1127155, bsc#1109137).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory (bsc#1133021).\n- kvm: mmu: Fix overflow on kvm mmu page limit calculation (bsc#1135335).\n- kvm/mmu: kABI fix for *_mmu_pages changes in struct kvm_arch (bsc#1135335).\n- KVM: polling: add architecture backend to disable polling (bsc#1119222).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: s390: change default halt poll time to 50us (bsc#1119222).\n- KVM: s390: enable CONFIG_HAVE_KVM_NO_POLL (bsc#1119222)\n- KVM: s390: fix typo in parameter description (bsc#1119222).\n- KVM: s390: kABI Workaround for \u0027kvm_vcpu_stat\u0027\n- KVM: s390: kABI Workaround for \u0027lowcore\u0027 (bsc#1119222).\n- KVM: s390: provide kvm_arch_no_poll function (bsc#1119222).\n- kvm: svm/avic: Do not send AVIC doorbell to self (bsc#1140133).\n- kvm: svm/avic: fix off-by-one in checking host APIC ID (bsc#1140971).\n- KVM: SVM: Fix detection of AMD Errata 1096 (bsc#1142354).\n- KVM: x86: fix return value for reserved EFER (bsc#1140992).\n- kvm: x86: Include CPUID leaf 0x8000001e in kvm\u0027s supported CPUID (bsc#1114279).\n- kvm: x86: Include multiple indices with CPUID leaf 0x8000001d (bsc#1114279).\n- KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes (bsc#1140972).\n- lapb: fixed leak of control-blocks (networking-stable-19_06_18).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk (bsc#1051510).\n- lib/bitmap.c: make bitmap_parselist() thread-safe and much faster (bsc#1143507).\n- lib: fix stall in __bitmap_parselist() (bsc#1051510).\n- libnvdimm/bus: Prevent duplicate device_unregister() calls (bsc#1139865).\n- libnvdimm/namespace: Fix label tracking error (bsc#1142350).\n- libnvdimm, pfn: Fix over-trim in trim_pfn_device() (bsc#1140719).\n- lib/scatterlist: Fix mapping iterator when sg-\u003eoffset is greater than PAGE_SIZE (bsc#1051510).\n- livepatch: Remove duplicate warning about missing reliable stacktrace support (bsc#1071995 fate#323487).\n- livepatch: Use static buffer for debugging messages under rq lock (bsc#1071995 fate#323487).\n- llc: fix skb leak in llc_build_and_send_ui_pkt() (networking-stable-19_05_31).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Do not use stack memory with scatterlist for GMAC (bsc#1051510).\n- mac80211: drop robust management frames from unknown TA (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: handle deauthentication/disassociation from TDLS peer (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: cpia2_usb: first wake up, then free in disconnect (bsc#1135642).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: marvell-ccic: fix DMA s/g desc number calculation (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format doesn\u0027t match (bsc#1051510).\n- media: s5p-mfc: Make additional clocks optional (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- media: v4l2-ioctl: clear fields in s_parm (bsc#1051510).\n- media: v4l2: Test type instead of cfg-\u003etype in v4l2_ctrl_new_custom() (bsc#1051510).\n- media: vivid: fix incorrect assignment operation when setting video mode (bsc#1051510).\n- mei: bus: need to unlink client before freeing (bsc#1051510).\n- mei: me: add denverton innovation engine device IDs (bsc#1051510).\n- mei: me: add gemini lake devices id (bsc#1051510).\n- memory: tegra: Fix integer overflow on tick value calculation (bsc#1051510).\n- memstick: Fix error cleanup path of memstick_init (bsc#1051510).\n- Merge branch \u0027origin/users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027packaging\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027scripts\u0027 into SLE15\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE12-SP4_EMBARGO\n- Merge branch \u0027SLE15_EMBARGO\u0027 into SLE15\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE12-SP4\n- Merge branch \u0027SLE15\u0027 into SLE15_EMBARGO\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027SLE15\u0027 into users/tiwai/SLE15/bsc1139358\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/bpetkov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/dkirjanov/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fbaumanis/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fdmanana/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/fyang/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ggherdovich/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/glin/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/hare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jack/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jdelvare/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jgross/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jroedel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jslaby/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/jthumshirn/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lduncan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lhenriques/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/lyan/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbenes/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mbrugger/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mgorman/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE12-SP4/bnc1136896\u0027 into users/mhocko/SLE12-SP4/for-next\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into SLE15\n- Merge branch \u0027users/mhocko/SLE15/bnc1139358\u0027 into users/mhocko/SLE12-SP4/bnc1139358\n- Merge branch \u0027users/mhocko/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkoutny/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/1137586\u0027 into SLE15_EMBARGO\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/mkubecek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/bsc1137534-s390-jumplabel-perf\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/msuchanek/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/nfbrown/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ohering/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/oneukum/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/osalvador/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/ptesarik/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/pvorel/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tbogendoerfer/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/tzimmermann/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge branch \u0027users/vbabka/SLE15/for-next\u0027 into SLE15\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/SLE15\u0027 into SLE12-SP4_EMBARGO\n- Merge remote-tracking branch \u0027origin/users/fyang/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/ghe/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mfleming/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/mhocko/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- Merge remote-tracking branch \u0027origin/users/msuchanek/SLE12-SP4/for-next\u0027 into SLE12-SP4\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: hi655x: Fix regmap area declared size for hi655x (bsc#1051510).\n- mfd: intel-lpss: Release IDA resources (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mISDN: make sure device name is NUL terminated (bsc#1051510).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: core: Prevent processing SDIO IRQs when the card is suspended (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc: sdhci-pci: Try \u0027cd\u0027 for card-detect lookup before using NULL (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mm: migrate: Fix reference check race between __find_get_block() and migration (bnc#1137609).\n- mm/nvdimm: add is_ioremap_addr and use that to check ioremap address (bsc#1140322 LTC#176270).\n- mm, page_alloc: fix has_unmovable_pages for HugePages (bsc#1127034).\n- mm: pagechage-limit: Calculate pagecache-limit based on node state (bsc#1136811)\n- mm: replace all open encodings for NUMA_NO_NODE (bsc#1140322 LTC#176270).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mm/vmscan.c: prevent useless kswapd loops (git fixes (mm/vmscan)).\n- module: Fix livepatch/ftrace module text permissions race (bsc#1071995 fate#323487).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- Move patch to correct directory.\n- Move stuff git_sort chokes on, out of the way\n- Move upstreamed ASoC patches into sorted section\n- mwifiex: Abort at too short BSS descriptor element (bsc#1136424 CVE-2019-3846).\n- mwifiex: Don\u0027t abort on small, spec-compliant vendor IEs (CVE-2019-3846,bsc#1136424).\n- mwifiex: fix 802.11n/WPA detection (CVE-2019-3846,bsc#1136424).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- neigh: fix use-after-free read in pneigh_get_next (networking-stable-19_06_18).\n- net/af_iucv: remove GFP_DMA restriction for HiperTransport (bsc#1142112 bsc#1142221 LTC#179334 LTC#179332).\n- net: avoid weird emergency message (networking-stable-19_05_21).\n- net: fec: fix the clk mismatch in failed_reset path (networking-stable-19_05_31).\n- netfilter: conntrack: fix calculation of next bucket number in early_drop (git-fixes).\n- net-gro: fix use-after-free read in napi_gro_frags() (networking-stable-19_05_31).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/mlx4_core: Change the error print to info print (networking-stable-19_05_21).\n- net/mlx4_en: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_06_09).\n- net/mlx5: Allocate root ns memory using kzalloc to match kfree (networking-stable-19_05_31).\n- net/mlx5: Avoid double free in fs init error unwinding path (networking-stable-19_05_31).\n- net: mvneta: Fix err code path of probe (networking-stable-19_05_31).\n- net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value (networking-stable-19_05_31).\n- net: mvpp2: prs: Fix parser range for VID filtering (bsc#1098633).\n- net: mvpp2: prs: Use the correct helpers when removing all VID filters (bsc#1098633).\n- net: mvpp2: Use strscpy to handle stat strings (bsc#1098633).\n- netns: get more entropy from net_hash_mix() (CVE-2019-10638 bsc#1140575).\n- netns: provide pure entropy for net_hash_mix() (CVE-2019-10639 bsc#1140577).\n- net: openvswitch: do not free vport if register_netdevice() is failed (networking-stable-19_06_18).\n- net/packet: fix memory leak in packet_set_ring() (git-fixes).\n- net: rds: fix memory leak in rds_ib_flush_mr_pool (networking-stable-19_06_09).\n- net: seeq: fix crash caused by not set dev.parent (networking-stable-19_05_14).\n- net: stmmac: fix reset gpio free missing (networking-stable-19_05_31).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: usb: qmi_wwan: add Telit 0x1260 and 0x1261 compositions (networking-stable-19_05_21).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- nfit/ars: Allow root to busy-poll the ARS state machine (bsc#1140814).\n- nfit/ars: Avoid stale ARS results (jsc#SLE-5433).\n- nfit/ars: Introduce scrub_flags (jsc#SLE-5433).\n- NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme: copy MTFA field from identify controller (bsc#1140715).\n- nvme: fix memory leak caused by incorrect subsystem free (bsc#1143185).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Don\u0027t let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme-rdma: fix double freeing of async event data (bsc#1120423).\n- nvme-rdma: fix possible double free of controller async event buffer (bsc#1120423).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- ocfs2: add first lock wait time in locking_state (bsc#1134390).\n- ocfs2: add last unlock times in locking_state (bsc#1134390).\n- ocfs2: add locking filter debugfs file (bsc#1134390).\n- ocfs2: try to reuse extent block in dealloc without meta_alloc (bsc#1128902).\n- ocfs2: turn on OCFS2_FS_STATS setting(bsc#1134393)\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- packet: Fix error path in packet_init (networking-stable-19_05_14).\n- packet: in recvmsg msg_name return at least sizeof sockaddr_ll (git-fixes).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- patches.fixes/mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- patches.fixes/scsi-vmw_pscsi-Fix-use-after-free-in-pvscsi_queue_lc.patch: Update patch metadata\n- patches.suse/Btrfs-kill-btrfs_clear_path_blocking.patch: (bsc#1140139).\n- PCI: Always allow probing with driver_override (bsc#1051510).\n- PCI: Do not poll for PME if the device is in D3cold (bsc#1051510).\n- PCI: hv: Add hv_pci_remove_slots() when we unload the driver (bsc#1142701).\n- PCI: hv: Add pci_destroy_slot() in pci_devices_present_work(), if necessary (bsc#1142701).\n- PCI: hv: Fix a memory leak in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix a use-after-free bug in hv_eject_device_work() (bsc#1142701).\n- PCI: hv: Fix return value check in hv_pci_assign_slots() (bsc#1142701).\n- PCI: hv: Remove unused reason for refcount handler (bsc#1142701).\n- PCI: hv: support reporting serial number as slot information (bsc#1142701).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: PM: Skip devices in D0 for suspend-to-idle (bsc#1051510).\n- PCI: Return error if cannot probe VF (bsc#1051510).\n- PCI: rpadlpar: Fix leaked device_node references in add/remove paths (bsc#1051510).\n- perf tools: Add Hygon Dhyana support (fate#327735).\n- perf/x86/intel/cstate: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/rapl: Cosmetic rename internal variables in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/rapl: Support multi-die/package (jsc#SLE-5454).\n- perf/x86/intel/uncore: Cosmetic renames in response to multi-die/pkg support (jsc#SLE-5454).\n- perf/x86/intel/uncore: Support multi-die/package (jsc#SLE-5454).\n- pkey: Indicate old mkvp only if old and current mkvp are different (bsc#1137827 LTC#178090).\n- pktgen: do not sleep with the thread lock held (git-fixes).\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: asus-nb-wmi: Support ALS on the Zenbook UX430UQ (bsc#1051510).\n- platform/x86: asus-wmi: Only Tell EC the OS will handle display hotkeys from asus_nb_wmi (bsc#1051510).\n- platform/x86: intel_turbo_max_3: Remove restriction for HWP platforms (jsc#SLE-5439).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: pmc_atom: Add CB4063 Beckhoff Automation board to critclk_systems DMI table (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powercap/intel_rapl: Simplify rapl_find_package() (jsc#SLE-5454).\n- powercap/intel_rapl: Support multi-die/package (jsc#SLE-5454).\n- powercap/intel_rapl: Update RAPL domain name and debug messages (jsc#SLE-5454).\n- powerpc/64s: Remove POWER9 DD1 support (bsc#1055117, LTC#159753, FATE#323286, git-fixes).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/crypto: Use cheaper random numbers for crc-vpmsum self-test (FATE#327696).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/mm: Change function prototype (bsc#1055117).\n- powerpc/mm: Consolidate numa_enable check and min_common_depth check (bsc#1140322 LTC#176270).\n- powerpc/mm/drconf: Use NUMA_NO_NODE on failures instead of node 0 (bsc#1140322 LTC#176270).\n- powerpc/mm: Fix node look up with numa=off boot (bsc#1140322 LTC#176270).\n- powerpc/mm/hugetlb: Update huge_ptep_set_access_flags to call __ptep_set_access_flags directly (bsc#1055117).\n- powerpc/mm/radix: Change pte relax sequence to handle nest MMU hang (bsc#1055117).\n- powerpc/mm/radix: Move function from radix.h to pgtable-radix.c (bsc#1055117).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Add PM_LD_MISS_L1 and PM_BR_2PATH to power9 event list (bsc#1137728, LTC#178106).\n- powerpc/perf: Add POWER9 alternate PM_RUN_CYC and PM_RUN_INST_CMPL events (bsc#1137728, LTC#178106).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries/dlpar: Fix a missing check in dlpar_parse_cc_property() (bsc#1137194, CVE-2019-12614).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- powerpc/rtas: retry when cpu offline races with suspend/migration (bsc#1140428, LTC#178808).\n- powerpc/tm: Fix oops on sigreturn on systems without TM (bsc#1142265 CVE-2019-13648).\n- powerpc/watchpoint: Restore NV GPRs while returning from exception (bsc#1140945 bsc#1141401 bsc#1141402 bsc#1141452 bsc#1141453 bsc#1141454 LTC#178983 LTC#179191 LTC#179192 LTC#179193 LTC#179194 LTC#179195).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- ppp: deflate: Fix possible crash in deflate_init (networking-stable-19_05_21).\n- ppp: mppe: Add softdep to arc4 (bsc#1088047).\n- ptrace: Fix -\u003eptracer_cred handling for PTRACE_TRACEME (git-fixes).\n- ptrace: restore smp_rmb() in __ptrace_may_access() (git-fixes).\n- pwm: stm32: Use 3 cells -\u003eof_xlate() (bsc#1111666).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: add network device usage statistics for qmimux devices (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- qmi_wwan: add support for QMAP padding in the RX path (bsc#1051510).\n- qmi_wwan: avoid RCU stalls on device disconnect when in QMAP mode (bsc#1051510).\n- qmi_wwan: extend permitted QMAP mux_id value range (bsc#1051510).\n- qmi_wwan: Fix out-of-bounds read (bsc#1111666).\n- rapidio: fix a NULL pointer dereference when create_workqueue() fails (bsc#1051510).\n- ras/CEC: Convert the timer callback to a workqueue (bsc#1114279).\n- ras/CEC: Fix binary search function (bsc#1114279).\n- rds: IB: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- regulator: s2mps11: Fix buck7 and buck8 wrong voltages (bsc#1051510).\n- Replace the bluetooth fix with the upstream commit (bsc#1135556)\n- Revert \u0027alsa: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error()\u0027 (bsc#1140652).\n- Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027 (bsc#1109137).\n- Revert \u0027e1000e: fix cyclic resets at link up with active tx\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\n- Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\n- Revert \u0027livepatch: Remove reliable stacktrace check in klp_try_switch_task()\u0027 (bsc#1071995 fate#323487).\n- Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\u0027\u0027\n- Revert \u0027Revert \u0027KMPs: provide and conflict a kernel version specific KMP name\u0027\u0027\n- Revert \u0027Revert \u0027Revert \u0027Drop multiversion(kernel) from the KMP template (fate#323189)\u0027\u0027\u0027\n- Revert \u0027s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\u0027\n- Revert \u0027serial: 8250: Don\u0027t service RX FIFO if interrupts are disabled\u0027 (bsc#1051510).\n- Revert \u0027Sign non-x86 kernels when possible (boo#1134303)\u0027\n- Revert \u0027svm: Fix AVIC incomplete IPI emulation\u0027 (bsc#1140133).\n- rpm/kernel-binary.spec.in: Add back kernel-binary-base subpackage (jsc#SLE-3853).\n- rpm/kernel-binary.spec.in: Build livepatch support in SUSE release projects (bsc#1124167).\n- rpm/kernel-binary.spec.in: Update drm-kmp obsolete for SLE12-SP3/Leap-42.3\n- rpm/post.sh: correct typo in err msg (bsc#1137625)\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: don\u0027t reference bogus function pointer in kdoc (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtnetlink: always put IFLA_LINK for links with a link-netnsid (networking-stable-19_05_21).\n- s390/dasd: fix using offset into zero size array error (bsc#1051510).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/jump_label: Use \u0027jdd\u0027 constraint on gcc9 (bsc#1138589).\n- s390/qeth: be drop monitor friendly (bsc#1142220 LTC#179335).\n- s390/qeth: fix race when initializing the IP address table (bsc#1051510).\n- s390/qeth: fix VLAN attribute in bridge_hostnotify udev event (bsc#1051510).\n- s390/setup: fix early warning messages (bsc#1051510).\n- s390/virtio: handle find on invalid queue gracefully (bsc#1051510).\n- s390/vtime: steal time exponential moving average (bsc#1119222).\n- s390/zcrypt: Fix wrong dispatching for control domain CPRBs (bsc#1137811 LTC#178088).\n- sbitmap: fix improper use of smp_mb__before_atomic() (bsc#1140658).\n- sched/topology: Improve load balancing on AMD EPYC (bsc#1137366).\n- scripts/tar-up.sh: do not make assumptions about the remote name (bsc#1141488)\n- scsi: core: add new RDAC LENOVO/DE_Series device (bsc#1132390).\n- scsi: ibmvfc: fix WARN_ON during event pool release (bsc#1137458 LTC#178093).\n- scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836 bsc#1134395).\n- scsi: megaraid_sas: return error when create DMA pool failed (CVE-2019-11810 bsc#1134399).\n- scsi: mpt3sas_ctl: fix double-fetch bug in _ctl_ioctl_main() (bsc#1136922 CVE-2019-12456).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix abort handling in tcm_qla2xxx_write_pending() (bsc#1140727).\n- scsi: qla2xxx: fix error message on \u0026lt;qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix FC-AL connection target discovery (bsc#1094555).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bsc#1140728).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix N2N target discovery with Local loop (bsc#1094555).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: target/iblock: Fix overrun in WRITE SAME emulation (bsc#1140424).\n- scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck() (bsc#1135296).\n- scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove (bsc#1051510).\n- scsi: zfcp: fix rport unblock if deleted SCSI devices on Scsi_Host (bsc#1051510).\n- scsi: zfcp: fix scsi_eh host reset with port_forced ERP for non-NPIV FCP devices (bsc#1051510).\n- scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs) (bsc#1051510).\n- sctp: Free cookie before we memdup a new one (networking-stable-19_06_18).\n- sctp: silence warns on sctp_stream_init allocations (bsc#1083710).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- serial: uartps: Do not add a trailing semicolon to macro (bsc#1051510).\n- serial: uartps: Fix long line over 80 chars (bsc#1051510).\n- serial: uartps: Fix multiple line dereference (bsc#1051510).\n- serial: uartps: Remove useless return from cdns_uart_poll_put_char (bsc#1051510).\n- signal/ptrace: Don\u0027t leak unitialized kernel memory with PTRACE_PEEK_SIGINFO (git-fixes).\n- Sign non-x86 kernels when possible (boo#1134303)\n- SMB3: Fix endian warning (bsc#1137884).\n- soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher (bsc#1051510).\n- soc: rockchip: Set the proper PWM for rk3288 (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: comedi: amplc_pci230: fix null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: dt282x: fix a null pointer deref on interrupt (bsc#1051510).\n- staging: comedi: ni_mio_common: Fix divide-by-zero for DIO cmdtest (bsc#1051510).\n- staging:iio:ad7150: fix threshold mode config bit (bsc#1051510).\n- staging: rtl8712: reduce stack usage, again (bsc#1051510).\n- Staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg (networking-stable-19_06_18).\n- svm: Add warning message for AVIC IPI invalid target (bsc#1140133).\n- svm: Fix AVIC incomplete IPI emulation (bsc#1140133).\n- sysctl: handle overflow in proc_get_long (bsc#1051510).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: be more careful in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: fix fack_count accounting on tcp_shift_skb_data() (CVE-2019-11477 bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: reduce tcp_fastretrans_alert() verbosity (git-fixes).\n- tcp: refine memory limit test in tcp_fragment() (CVE-2019-11478 bsc#1137586 bsc#1139751).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- team: Always enable vlan tx offload (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal: rcar_gen3_thermal: disable interrupt in .remove (bsc#1051510).\n- thermal/x86_pkg_temp_thermal: Cosmetic: Rename internal variables to zones from packages (jsc#SLE-5454).\n- thermal/x86_pkg_temp_thermal: Support multi-die/package (jsc#SLE-5454).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tmpfs: fix link accounting when a tmpfile is linked in (bsc#1051510).\n- tmpfs: fix uninitialized return value in shmem_link (bsc#1051510).\n- tools/cpupower: Add Hygon Dhyana support (fate#327735).\n- topology: Create core_cpus and die_cpus sysfs attributes (jsc#SLE-5454).\n- topology: Create package_cpus sysfs attribute (jsc#SLE-5454).\n- tracing/snapshot: Resize spare buffer if size changed (bsc#1140726).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- Trim build dependencies of sample subpackage spec file (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1128910).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: max310x: Fix external crystal register setup (bsc#1051510).\n- tty: rocket: fix incorrect forward declaration of \u0027rp_init()\u0027 (bsc#1051510).\n- tty: serial_core: Set port active bit in uart_port_activate (bsc#1051510).\n- tty: serial: cpm_uart - fix init when SMC is relocated (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tuntap: synchronize through tfiles array instead of tun-\u003enumqueues (networking-stable-19_05_14).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- Update config files for NFSv4.2\n- Update patches.fixes/0001-mwifiex-Fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch (bsc#1136935 CVE-2019-10126). Added CVE number\n- Update patches.fixes/nfsd-COPY-and-CLONE-operations-require-the-saved-fil.patch (git-fixes, bsc#1137103, CVE-2018-16871).\n- Update patches.suse/do-not-default-to-ibrs-on-skl.patch (bsc#1068032 CVE-2017-5753 bsc#1112824 jsc#SLE-7074).\n- Update patch referecens for two sercurity fixes (CVE-2019-12819, bsc#1138291, CVE-2019-12818, bsc#1138293).\n- Update References field to patches.suse/0275-bcache-never-writeback-a-discard-operation.patch (bsc#1130972, bsc#1102247).\n- Update \u0027SACK Panic\u0027 patches to reflect upstream state.\n- Update upstream patch tags\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: chipidea: udc: workaround for endpoint conflict issue (bsc#1135642).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- USB: core: Don\u0027t unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: dwc2: host: Fix wMaxPacketSize handling (fix webcam regression) (bsc#1135642).\n- USB: Fix chipmunk-like voice when using Logitech C270 for recording audio (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usb: gadget: ether: Fix race between gether_disconnect and rx_submit (bsc#1051510).\n- usb: gadget: fusb300_udc: Fix memory leak of fusb300-\u003eep[i] (bsc#1051510).\n- usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usbnet: ipheth: fix racing condition (bsc#1051510).\n- usb: pci-quirks: Correct AMD PLL quirk detection (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: serial: fix initial-termios handling (bsc#1135642).\n- USB: serial: ftdi_sio: add ID for isodebug v1 (bsc#1051510).\n- USB: serial: option: add support for GosunCn ME3630 RNDIS mode (bsc#1051510).\n- USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode (bsc#1051510).\n- USB: serial: option: add Telit 0x1260 and 0x1261 compositions (bsc#1051510).\n- USB: serial: pl2303: add Allied Telesis VT-Kit3 (bsc#1051510).\n- USB: serial: pl2303: fix tranceiver suspend mode (bsc#1135642).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- USB: usb-storage: Add new ID to ums-realtek (bsc#1051510).\n- usb: xhci: avoid null pointer deref when bos field is NULL (bsc#1135642).\n- vfio: ccw: only free cp on final interrupt (bsc#1051510).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vlan: disable SIOCSHWTSTAMP in container (bsc#1051510).\n- VMCI: Fix integer overflow in VMCI handle arrays (bsc#1051510).\n- vrf: sit mtu should not be updated when vrf netdev is the link (networking-stable-19_05_14).\n- vsock/virtio: free packets during the socket release (networking-stable-19_05_21).\n- vsock/virtio: set SOCK_DONE on peer shutdown (networking-stable-19_06_18).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: fix potential out-of-bounds read (bsc#1051510).\n- x86/alternative: Init ideal_nops for Hygon Dhyana (fate#327735).\n- x86/amd_nb: Add support for Raven Ridge CPUs (FATE#327735).\n- x86/amd_nb: Check vendor in AMD-only functions (fate#327735).\n- x86/apic: Add Hygon Dhyana support (fate#327735).\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery (fate#327735).\n- x86/CPU/AMD: Don\u0027t force the CPB cap when running under a hypervisor (bsc#1114279).\n- x86/cpu: Create Hygon Dhyana architecture support file (fate#327735).\n- x86/cpufeatures: Carve out CQM features retrieval (jsc#SLE-5382).\n- x86/cpufeatures: Combine word 11 and 12 into a new scattered features word (jsc#SLE-5382).\n- x86/cpufeatures: Enumerate the new AVX512 BFLOAT16 instructions (jsc#SLE-5382).\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana (fate#327735).\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors (fate#327735).\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number (fate#327735).\n- x86/events: Add Hygon Dhyana support to PMU infrastructure (fate#327735).\n- x86/kvm: Add Hygon Dhyana support to KVM (fate#327735).\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure (fate#327735).\n- x86/mce: Don\u0027t disable MCA banks when offlining a CPU on AMD (fate#327735).\n- x86/mce: Fix machine_check_poll() tests for error types (bsc#1114279).\n- x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callback (bsc#1114279).\n- x86/microcode: Fix microcode hotplug state (bsc#1114279).\n- x86/microcode: Fix the ancient deprecated microcode loading method (bsc#1114279).\n- x86, mm: fix fast GUP with hyper-based TLB flushing (VM Functionality, bsc#1140903).\n- x86/mm/mem_encrypt: Disable all instrumentation for early SME setup (bsc#1114279).\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge (fate#327735).\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana (fate#327735).\n- x86/smpboot: Rename match_die() to match_pkg() (jsc#SLE-5454).\n- x86/speculation/mds: Revert CPU buffer clear on double fault exit (bsc#1114279).\n- x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS (bsc#1139358, CVE-2019-1125).\n- x86/topology: Add CPUID.1F multi-die/package support (jsc#SLE-5454).\n- x86/topology: Create topology_max_die_per_package() (jsc#SLE-5454).\n- x86/topology: Define topology_die_id() (jsc#SLE-5454).\n- x86/topology: Define topology_logical_die_id() (jsc#SLE-5454).\n- x86/xen: Add Hygon Dhyana support to Xen (fate#327735).\n- xen: let alloc_xenballooned_pages() fail if not enough memory free (bsc#1142450 XSA-300).\n- xen/pciback: Don\u0027t disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: don\u0027t clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: don\u0027t look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: don\u0027t overflow xattr listent buffer (bsc#1143105).\n- xfs: don\u0027t use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: don\u0027t use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2450,SUSE-SLE-RT-12-SP4-2019-2450",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2450-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2450-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2450-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083710",
"url": "https://bugzilla.suse.com/1083710"
},
{
"category": "self",
"summary": "SUSE Bug 1088047",
"url": "https://bugzilla.suse.com/1088047"
},
{
"category": "self",
"summary": "SUSE Bug 1094555",
"url": "https://bugzilla.suse.com/1094555"
},
{
"category": "self",
"summary": "SUSE Bug 1098633",
"url": "https://bugzilla.suse.com/1098633"
},
{
"category": "self",
"summary": "SUSE Bug 1102247",
"url": "https://bugzilla.suse.com/1102247"
},
{
"category": "self",
"summary": "SUSE Bug 1106383",
"url": "https://bugzilla.suse.com/1106383"
},
{
"category": "self",
"summary": "SUSE Bug 1106751",
"url": "https://bugzilla.suse.com/1106751"
},
{
"category": "self",
"summary": "SUSE Bug 1109137",
"url": "https://bugzilla.suse.com/1109137"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 11123080",
"url": "https://bugzilla.suse.com/11123080"
},
{
"category": "self",
"summary": "SUSE Bug 1112824",
"url": "https://bugzilla.suse.com/1112824"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1119222",
"url": "https://bugzilla.suse.com/1119222"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1124167",
"url": "https://bugzilla.suse.com/1124167"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1127034",
"url": "https://bugzilla.suse.com/1127034"
},
{
"category": "self",
"summary": "SUSE Bug 1127155",
"url": "https://bugzilla.suse.com/1127155"
},
{
"category": "self",
"summary": "SUSE Bug 1127315",
"url": "https://bugzilla.suse.com/1127315"
},
{
"category": "self",
"summary": "SUSE Bug 1128432",
"url": "https://bugzilla.suse.com/1128432"
},
{
"category": "self",
"summary": "SUSE Bug 1128902",
"url": "https://bugzilla.suse.com/1128902"
},
{
"category": "self",
"summary": "SUSE Bug 1128910",
"url": "https://bugzilla.suse.com/1128910"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1132154",
"url": "https://bugzilla.suse.com/1132154"
},
{
"category": "self",
"summary": "SUSE Bug 1132390",
"url": "https://bugzilla.suse.com/1132390"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1133401",
"url": "https://bugzilla.suse.com/1133401"
},
{
"category": "self",
"summary": "SUSE Bug 1133738",
"url": "https://bugzilla.suse.com/1133738"
},
{
"category": "self",
"summary": "SUSE Bug 1134097",
"url": "https://bugzilla.suse.com/1134097"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1134390",
"url": "https://bugzilla.suse.com/1134390"
},
{
"category": "self",
"summary": "SUSE Bug 1134393",
"url": "https://bugzilla.suse.com/1134393"
},
{
"category": "self",
"summary": "SUSE Bug 1134395",
"url": "https://bugzilla.suse.com/1134395"
},
{
"category": "self",
"summary": "SUSE Bug 1134399",
"url": "https://bugzilla.suse.com/1134399"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1135296",
"url": "https://bugzilla.suse.com/1135296"
},
{
"category": "self",
"summary": "SUSE Bug 1135335",
"url": "https://bugzilla.suse.com/1135335"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1136157",
"url": "https://bugzilla.suse.com/1136157"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136598",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "self",
"summary": "SUSE Bug 1136811",
"url": "https://bugzilla.suse.com/1136811"
},
{
"category": "self",
"summary": "SUSE Bug 1136896",
"url": "https://bugzilla.suse.com/1136896"
},
{
"category": "self",
"summary": "SUSE Bug 1136922",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137103",
"url": "https://bugzilla.suse.com/1137103"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137194",
"url": "https://bugzilla.suse.com/1137194"
},
{
"category": "self",
"summary": "SUSE Bug 1137366",
"url": "https://bugzilla.suse.com/1137366"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137429",
"url": "https://bugzilla.suse.com/1137429"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137458",
"url": "https://bugzilla.suse.com/1137458"
},
{
"category": "self",
"summary": "SUSE Bug 1137534",
"url": "https://bugzilla.suse.com/1137534"
},
{
"category": "self",
"summary": "SUSE Bug 1137535",
"url": "https://bugzilla.suse.com/1137535"
},
{
"category": "self",
"summary": "SUSE Bug 1137584",
"url": "https://bugzilla.suse.com/1137584"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137609",
"url": "https://bugzilla.suse.com/1137609"
},
{
"category": "self",
"summary": "SUSE Bug 1137625",
"url": "https://bugzilla.suse.com/1137625"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 1137811",
"url": "https://bugzilla.suse.com/1137811"
},
{
"category": "self",
"summary": "SUSE Bug 1137827",
"url": "https://bugzilla.suse.com/1137827"
},
{
"category": "self",
"summary": "SUSE Bug 1137884",
"url": "https://bugzilla.suse.com/1137884"
},
{
"category": "self",
"summary": "SUSE Bug 1137995",
"url": "https://bugzilla.suse.com/1137995"
},
{
"category": "self",
"summary": "SUSE Bug 1137996",
"url": "https://bugzilla.suse.com/1137996"
},
{
"category": "self",
"summary": "SUSE Bug 1137998",
"url": "https://bugzilla.suse.com/1137998"
},
{
"category": "self",
"summary": "SUSE Bug 1137999",
"url": "https://bugzilla.suse.com/1137999"
},
{
"category": "self",
"summary": "SUSE Bug 1138000",
"url": "https://bugzilla.suse.com/1138000"
},
{
"category": "self",
"summary": "SUSE Bug 1138002",
"url": "https://bugzilla.suse.com/1138002"
},
{
"category": "self",
"summary": "SUSE Bug 1138003",
"url": "https://bugzilla.suse.com/1138003"
},
{
"category": "self",
"summary": "SUSE Bug 1138005",
"url": "https://bugzilla.suse.com/1138005"
},
{
"category": "self",
"summary": "SUSE Bug 1138006",
"url": "https://bugzilla.suse.com/1138006"
},
{
"category": "self",
"summary": "SUSE Bug 1138007",
"url": "https://bugzilla.suse.com/1138007"
},
{
"category": "self",
"summary": "SUSE Bug 1138008",
"url": "https://bugzilla.suse.com/1138008"
},
{
"category": "self",
"summary": "SUSE Bug 1138009",
"url": "https://bugzilla.suse.com/1138009"
},
{
"category": "self",
"summary": "SUSE Bug 1138010",
"url": "https://bugzilla.suse.com/1138010"
},
{
"category": "self",
"summary": "SUSE Bug 1138011",
"url": "https://bugzilla.suse.com/1138011"
},
{
"category": "self",
"summary": "SUSE Bug 1138012",
"url": "https://bugzilla.suse.com/1138012"
},
{
"category": "self",
"summary": "SUSE Bug 1138013",
"url": "https://bugzilla.suse.com/1138013"
},
{
"category": "self",
"summary": "SUSE Bug 1138014",
"url": "https://bugzilla.suse.com/1138014"
},
{
"category": "self",
"summary": "SUSE Bug 1138015",
"url": "https://bugzilla.suse.com/1138015"
},
{
"category": "self",
"summary": "SUSE Bug 1138016",
"url": "https://bugzilla.suse.com/1138016"
},
{
"category": "self",
"summary": "SUSE Bug 1138017",
"url": "https://bugzilla.suse.com/1138017"
},
{
"category": "self",
"summary": "SUSE Bug 1138018",
"url": "https://bugzilla.suse.com/1138018"
},
{
"category": "self",
"summary": "SUSE Bug 1138019",
"url": "https://bugzilla.suse.com/1138019"
},
{
"category": "self",
"summary": "SUSE Bug 1138291",
"url": "https://bugzilla.suse.com/1138291"
},
{
"category": "self",
"summary": "SUSE Bug 1138293",
"url": "https://bugzilla.suse.com/1138293"
},
{
"category": "self",
"summary": "SUSE Bug 1138374",
"url": "https://bugzilla.suse.com/1138374"
},
{
"category": "self",
"summary": "SUSE Bug 1138375",
"url": "https://bugzilla.suse.com/1138375"
},
{
"category": "self",
"summary": "SUSE Bug 1138589",
"url": "https://bugzilla.suse.com/1138589"
},
{
"category": "self",
"summary": "SUSE Bug 1138719",
"url": "https://bugzilla.suse.com/1138719"
},
{
"category": "self",
"summary": "SUSE Bug 1139358",
"url": "https://bugzilla.suse.com/1139358"
},
{
"category": "self",
"summary": "SUSE Bug 1139751",
"url": "https://bugzilla.suse.com/1139751"
},
{
"category": "self",
"summary": "SUSE Bug 1139771",
"url": "https://bugzilla.suse.com/1139771"
},
{
"category": "self",
"summary": "SUSE Bug 1139782",
"url": "https://bugzilla.suse.com/1139782"
},
{
"category": "self",
"summary": "SUSE Bug 1139865",
"url": "https://bugzilla.suse.com/1139865"
},
{
"category": "self",
"summary": "SUSE Bug 1140133",
"url": "https://bugzilla.suse.com/1140133"
},
{
"category": "self",
"summary": "SUSE Bug 1140139",
"url": "https://bugzilla.suse.com/1140139"
},
{
"category": "self",
"summary": "SUSE Bug 1140322",
"url": "https://bugzilla.suse.com/1140322"
},
{
"category": "self",
"summary": "SUSE Bug 1140328",
"url": "https://bugzilla.suse.com/1140328"
},
{
"category": "self",
"summary": "SUSE Bug 1140405",
"url": "https://bugzilla.suse.com/1140405"
},
{
"category": "self",
"summary": "SUSE Bug 1140424",
"url": "https://bugzilla.suse.com/1140424"
},
{
"category": "self",
"summary": "SUSE Bug 1140428",
"url": "https://bugzilla.suse.com/1140428"
},
{
"category": "self",
"summary": "SUSE Bug 1140575",
"url": "https://bugzilla.suse.com/1140575"
},
{
"category": "self",
"summary": "SUSE Bug 1140577",
"url": "https://bugzilla.suse.com/1140577"
},
{
"category": "self",
"summary": "SUSE Bug 1140637",
"url": "https://bugzilla.suse.com/1140637"
},
{
"category": "self",
"summary": "SUSE Bug 1140652",
"url": "https://bugzilla.suse.com/1140652"
},
{
"category": "self",
"summary": "SUSE Bug 1140658",
"url": "https://bugzilla.suse.com/1140658"
},
{
"category": "self",
"summary": "SUSE Bug 1140715",
"url": "https://bugzilla.suse.com/1140715"
},
{
"category": "self",
"summary": "SUSE Bug 1140719",
"url": "https://bugzilla.suse.com/1140719"
},
{
"category": "self",
"summary": "SUSE Bug 1140726",
"url": "https://bugzilla.suse.com/1140726"
},
{
"category": "self",
"summary": "SUSE Bug 1140727",
"url": "https://bugzilla.suse.com/1140727"
},
{
"category": "self",
"summary": "SUSE Bug 1140728",
"url": "https://bugzilla.suse.com/1140728"
},
{
"category": "self",
"summary": "SUSE Bug 1140814",
"url": "https://bugzilla.suse.com/1140814"
},
{
"category": "self",
"summary": "SUSE Bug 1140887",
"url": "https://bugzilla.suse.com/1140887"
},
{
"category": "self",
"summary": "SUSE Bug 1140888",
"url": "https://bugzilla.suse.com/1140888"
},
{
"category": "self",
"summary": "SUSE Bug 1140889",
"url": "https://bugzilla.suse.com/1140889"
},
{
"category": "self",
"summary": "SUSE Bug 1140891",
"url": "https://bugzilla.suse.com/1140891"
},
{
"category": "self",
"summary": "SUSE Bug 1140893",
"url": "https://bugzilla.suse.com/1140893"
},
{
"category": "self",
"summary": "SUSE Bug 1140903",
"url": "https://bugzilla.suse.com/1140903"
},
{
"category": "self",
"summary": "SUSE Bug 1140945",
"url": "https://bugzilla.suse.com/1140945"
},
{
"category": "self",
"summary": "SUSE Bug 1140954",
"url": "https://bugzilla.suse.com/1140954"
},
{
"category": "self",
"summary": "SUSE Bug 1140955",
"url": "https://bugzilla.suse.com/1140955"
},
{
"category": "self",
"summary": "SUSE Bug 1140956",
"url": "https://bugzilla.suse.com/1140956"
},
{
"category": "self",
"summary": "SUSE Bug 1140957",
"url": "https://bugzilla.suse.com/1140957"
},
{
"category": "self",
"summary": "SUSE Bug 1140958",
"url": "https://bugzilla.suse.com/1140958"
},
{
"category": "self",
"summary": "SUSE Bug 1140959",
"url": "https://bugzilla.suse.com/1140959"
},
{
"category": "self",
"summary": "SUSE Bug 1140960",
"url": "https://bugzilla.suse.com/1140960"
},
{
"category": "self",
"summary": "SUSE Bug 1140961",
"url": "https://bugzilla.suse.com/1140961"
},
{
"category": "self",
"summary": "SUSE Bug 1140962",
"url": "https://bugzilla.suse.com/1140962"
},
{
"category": "self",
"summary": "SUSE Bug 1140964",
"url": "https://bugzilla.suse.com/1140964"
},
{
"category": "self",
"summary": "SUSE Bug 1140971",
"url": "https://bugzilla.suse.com/1140971"
},
{
"category": "self",
"summary": "SUSE Bug 1140972",
"url": "https://bugzilla.suse.com/1140972"
},
{
"category": "self",
"summary": "SUSE Bug 1140992",
"url": "https://bugzilla.suse.com/1140992"
},
{
"category": "self",
"summary": "SUSE Bug 1141401",
"url": "https://bugzilla.suse.com/1141401"
},
{
"category": "self",
"summary": "SUSE Bug 1141402",
"url": "https://bugzilla.suse.com/1141402"
},
{
"category": "self",
"summary": "SUSE Bug 1141452",
"url": "https://bugzilla.suse.com/1141452"
},
{
"category": "self",
"summary": "SUSE Bug 1141453",
"url": "https://bugzilla.suse.com/1141453"
},
{
"category": "self",
"summary": "SUSE Bug 1141454",
"url": "https://bugzilla.suse.com/1141454"
},
{
"category": "self",
"summary": "SUSE Bug 1141478",
"url": "https://bugzilla.suse.com/1141478"
},
{
"category": "self",
"summary": "SUSE Bug 1141488",
"url": "https://bugzilla.suse.com/1141488"
},
{
"category": "self",
"summary": "SUSE Bug 1142023",
"url": "https://bugzilla.suse.com/1142023"
},
{
"category": "self",
"summary": "SUSE Bug 1142112",
"url": "https://bugzilla.suse.com/1142112"
},
{
"category": "self",
"summary": "SUSE Bug 1142220",
"url": "https://bugzilla.suse.com/1142220"
},
{
"category": "self",
"summary": "SUSE Bug 1142221",
"url": "https://bugzilla.suse.com/1142221"
},
{
"category": "self",
"summary": "SUSE Bug 1142265",
"url": "https://bugzilla.suse.com/1142265"
},
{
"category": "self",
"summary": "SUSE Bug 1142350",
"url": "https://bugzilla.suse.com/1142350"
},
{
"category": "self",
"summary": "SUSE Bug 1142351",
"url": "https://bugzilla.suse.com/1142351"
},
{
"category": "self",
"summary": "SUSE Bug 1142354",
"url": "https://bugzilla.suse.com/1142354"
},
{
"category": "self",
"summary": "SUSE Bug 1142359",
"url": "https://bugzilla.suse.com/1142359"
},
{
"category": "self",
"summary": "SUSE Bug 1142450",
"url": "https://bugzilla.suse.com/1142450"
},
{
"category": "self",
"summary": "SUSE Bug 1142701",
"url": "https://bugzilla.suse.com/1142701"
},
{
"category": "self",
"summary": "SUSE Bug 1142868",
"url": "https://bugzilla.suse.com/1142868"
},
{
"category": "self",
"summary": "SUSE Bug 1143003",
"url": "https://bugzilla.suse.com/1143003"
},
{
"category": "self",
"summary": "SUSE Bug 1143045",
"url": "https://bugzilla.suse.com/1143045"
},
{
"category": "self",
"summary": "SUSE Bug 1143105",
"url": "https://bugzilla.suse.com/1143105"
},
{
"category": "self",
"summary": "SUSE Bug 1143185",
"url": "https://bugzilla.suse.com/1143185"
},
{
"category": "self",
"summary": "SUSE Bug 1143189",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "self",
"summary": "SUSE Bug 1143191",
"url": "https://bugzilla.suse.com/1143191"
},
{
"category": "self",
"summary": "SUSE Bug 1143507",
"url": "https://bugzilla.suse.com/1143507"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16871 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16871/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20836 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20855 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10126 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10638 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10638/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10639 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-1125 page",
"url": "https://www.suse.com/security/cve/CVE-2019-1125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11599 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11810 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12380 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12614 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13631 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13648 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14283 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14284 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-09-24T11:56:26Z",
"generator": {
"date": "2019-09-24T11:56:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2450-1",
"initial_release_date": "2019-09-24T11:56:26Z",
"revision_history": [
{
"date": "2019-09-24T11:56:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-8.3.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-8.3.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-8.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-8.3.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-8.3.1.noarch",
"product_id": "kernel-source-rt-4.12.14-8.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-8.3.1.x86_64",
"product_id": "kernel-rt-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-8.3.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-8.3.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-8.3.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-8.3.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-8.3.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-8.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-8.3.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-8.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16871"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16871",
"url": "https://www.suse.com/security/cve/CVE-2018-16871"
},
{
"category": "external",
"summary": "SUSE Bug 1137103 for CVE-2018-16871",
"url": "https://bugzilla.suse.com/1137103"
},
{
"category": "external",
"summary": "SUSE Bug 1156320 for CVE-2018-16871",
"url": "https://bugzilla.suse.com/1156320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2018-16871"
},
{
"cve": "CVE-2018-20836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20836"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20836",
"url": "https://www.suse.com/security/cve/CVE-2018-20836"
},
{
"category": "external",
"summary": "SUSE Bug 1134395 for CVE-2018-20836",
"url": "https://bugzilla.suse.com/1134395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-20836"
},
{
"cve": "CVE-2018-20855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20855"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20855",
"url": "https://www.suse.com/security/cve/CVE-2018-20855"
},
{
"category": "external",
"summary": "SUSE Bug 1143045 for CVE-2018-20855",
"url": "https://bugzilla.suse.com/1143045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2018-20855"
},
{
"cve": "CVE-2019-10126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10126"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10126",
"url": "https://www.suse.com/security/cve/CVE-2019-10126"
},
{
"category": "external",
"summary": "SUSE Bug 1136935 for CVE-2019-10126",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "external",
"summary": "SUSE Bug 1137944 for CVE-2019-10126",
"url": "https://bugzilla.suse.com/1137944"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-10126",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-10126",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2019-10126"
},
{
"cve": "CVE-2019-10638",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10638"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10638",
"url": "https://www.suse.com/security/cve/CVE-2019-10638"
},
{
"category": "external",
"summary": "SUSE Bug 1140575 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1140575"
},
{
"category": "external",
"summary": "SUSE Bug 1140577 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1140577"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-10638",
"url": "https://bugzilla.suse.com/1142129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-10638"
},
{
"cve": "CVE-2019-10639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10639"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker\u0027s web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10639",
"url": "https://www.suse.com/security/cve/CVE-2019-10639"
},
{
"category": "external",
"summary": "SUSE Bug 1140577 for CVE-2019-10639",
"url": "https://bugzilla.suse.com/1140577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-10639"
},
{
"cve": "CVE-2019-1125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-1125"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.\nTo exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further.\nOn January 3, 2018, Microsoft released an advisory and security updates\u202frelated to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125.\nMicrosoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-1125",
"url": "https://www.suse.com/security/cve/CVE-2019-1125"
},
{
"category": "external",
"summary": "SUSE Bug 1139358 for CVE-2019-1125",
"url": "https://bugzilla.suse.com/1139358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-1125"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11599"
}
],
"notes": [
{
"category": "general",
"text": "The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11599",
"url": "https://www.suse.com/security/cve/CVE-2019-11599"
},
{
"category": "external",
"summary": "SUSE Bug 1131645 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1131645"
},
{
"category": "external",
"summary": "SUSE Bug 1133738 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1133738"
},
{
"category": "external",
"summary": "SUSE Bug 1157905 for CVE-2019-11599",
"url": "https://bugzilla.suse.com/1157905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-11599"
},
{
"cve": "CVE-2019-11810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11810"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11810",
"url": "https://www.suse.com/security/cve/CVE-2019-11810"
},
{
"category": "external",
"summary": "SUSE Bug 1134399 for CVE-2019-11810",
"url": "https://bugzilla.suse.com/1134399"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "low"
}
],
"title": "CVE-2019-11810"
},
{
"cve": "CVE-2019-12380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12380"
}
],
"notes": [
{
"category": "general",
"text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12380",
"url": "https://www.suse.com/security/cve/CVE-2019-12380"
},
{
"category": "external",
"summary": "SUSE Bug 1136598 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "low"
}
],
"title": "CVE-2019-12380"
},
{
"cve": "CVE-2019-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12456"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12456",
"url": "https://www.suse.com/security/cve/CVE-2019-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1136922 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "external",
"summary": "SUSE Bug 1136993 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2019-12456"
},
{
"cve": "CVE-2019-12614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12614"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12614",
"url": "https://www.suse.com/security/cve/CVE-2019-12614"
},
{
"category": "external",
"summary": "SUSE Bug 1137194 for CVE-2019-12614",
"url": "https://bugzilla.suse.com/1137194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-12614"
},
{
"cve": "CVE-2019-12818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12818"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12818",
"url": "https://www.suse.com/security/cve/CVE-2019-12818"
},
{
"category": "external",
"summary": "SUSE Bug 1138293 for CVE-2019-12818",
"url": "https://bugzilla.suse.com/1138293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-12818"
},
{
"cve": "CVE-2019-12819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12819"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12819",
"url": "https://www.suse.com/security/cve/CVE-2019-12819"
},
{
"category": "external",
"summary": "SUSE Bug 1138291 for CVE-2019-12819",
"url": "https://bugzilla.suse.com/1138291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "low"
}
],
"title": "CVE-2019-12819"
},
{
"cve": "CVE-2019-13631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13631"
}
],
"notes": [
{
"category": "general",
"text": "In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13631",
"url": "https://www.suse.com/security/cve/CVE-2019-13631"
},
{
"category": "external",
"summary": "SUSE Bug 1142023 for CVE-2019-13631",
"url": "https://bugzilla.suse.com/1142023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13631"
},
{
"cve": "CVE-2019-13648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13648"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.1 on the powerpc platform, when hardware transactional memory is disabled, a local user can cause a denial of service (TM Bad Thing exception and system crash) via a sigreturn() system call that sends a crafted signal frame. This affects arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13648",
"url": "https://www.suse.com/security/cve/CVE-2019-13648"
},
{
"category": "external",
"summary": "SUSE Bug 1142254 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142254"
},
{
"category": "external",
"summary": "SUSE Bug 1142265 for CVE-2019-13648",
"url": "https://bugzilla.suse.com/1142265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13648"
},
{
"cve": "CVE-2019-14283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14283",
"url": "https://www.suse.com/security/cve/CVE-2019-14283"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14283",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-14283"
},
{
"cve": "CVE-2019-14284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14284",
"url": "https://www.suse.com/security/cve/CVE-2019-14284"
},
{
"category": "external",
"summary": "SUSE Bug 1143189 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143189"
},
{
"category": "external",
"summary": "SUSE Bug 1143191 for CVE-2019-14284",
"url": "https://bugzilla.suse.com/1143191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-14284"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.3.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.3.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-24T11:56:26Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1948-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 4.4.178-94_91 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. (bsc#1137586)\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136424).\n\nThis update contains a regression fix for CVE-2019-11477 and CVE-2019-11478 (bsc#1140747).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1948,SUSE-SLE-Live-Patching-12-SP4-2019-1936,SUSE-SLE-Live-Patching-12-SP4-2019-1937,SUSE-SLE-Live-Patching-12-SP4-2019-1938,SUSE-SLE-Live-Patching-12-SP4-2019-1939,SUSE-SLE-Live-Patching-12-SP4-2019-1940,SUSE-SLE-SAP-12-SP2-2019-1928,SUSE-SLE-SAP-12-SP2-2019-1929,SUSE-SLE-SAP-12-SP2-2019-1931,SUSE-SLE-SAP-12-SP2-2019-1932,SUSE-SLE-SAP-12-SP2-2019-1933,SUSE-SLE-SAP-12-SP2-2019-1934,SUSE-SLE-SAP-12-SP3-2019-1942,SUSE-SLE-SAP-12-SP3-2019-1943,SUSE-SLE-SAP-12-SP3-2019-1944,SUSE-SLE-SAP-12-SP3-2019-1945,SUSE-SLE-SAP-12-SP3-2019-1946,SUSE-SLE-SAP-12-SP3-2019-1947,SUSE-SLE-SAP-12-SP3-2019-1948,SUSE-SLE-SAP-12-SP3-2019-1949,SUSE-SLE-SAP-12-SP3-2019-1950,SUSE-SLE-SAP-12-SP3-2019-1951,SUSE-SLE-SAP-12-SP3-2019-1952,SUSE-SLE-SERVER-12-SP2-2019-1928,SUSE-SLE-SERVER-12-SP2-2019-1929,SUSE-SLE-SERVER-12-SP2-2019-1931,SUSE-SLE-SERVER-12-SP2-2019-1932,SUSE-SLE-SERVER-12-SP2-2019-1933,SUSE-SLE-SERVER-12-SP2-2019-1934,SUSE-SLE-SERVER-12-SP3-2019-1942,SUSE-SLE-SERVER-12-SP3-2019-1943,SUSE-SLE-SERVER-12-SP3-2019-1944,SUSE-SLE-SERVER-12-SP3-2019-1945,SUSE-SLE-SERVER-12-SP3-2019-1946,SUSE-SLE-SERVER-12-SP3-2019-1947,SUSE-SLE-SERVER-12-SP3-2019-1948,SUSE-SLE-SERVER-12-SP3-2019-1949,SUSE-SLE-SERVER-12-SP3-2019-1950,SUSE-SLE-SERVER-12-SP3-2019-1951,SUSE-SLE-SERVER-12-SP3-2019-1952",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1948-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1948-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191948-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1948-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE Bug 1140747",
"url": "https://bugzilla.suse.com/1140747"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)",
"tracking": {
"current_release_date": "2019-07-23T08:08:48Z",
"generator": {
"date": "2019-07-23T08:08:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1948-1",
"initial_release_date": "2019-07-23T08:08:48Z",
"revision_history": [
{
"date": "2019-07-23T08:08:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"product_id": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"product_id": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"product_id": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"product_id": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"product_id": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"product_id": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"product_id": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-23T08:08:48Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-23T08:08:48Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-94_41-default-6-2.16.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_16-default-3-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_3-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_6-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_104-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_109-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_92-default-8-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_95-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_98-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_140-94_42-default-10-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_143-94_47-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_155-94_50-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_57-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_61-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_156-94_64-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_69-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_162-94_72-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_175-94_79-default-4-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_176-94_88-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_178-94_91-default-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-23T08:08:48Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:1532-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.180 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic.\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will\nfragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an\nexpensive linked-list walk for subsequent SACKs received for that same TCP connection.\n- CVE-2019-11479: An attacker could force the Linux kernel to segment its responses into multiple TCP segments. This would drastically increased the bandwidth required to deliver the same amount of data. Further, it would consume additional resources such as CPU and NIC processing power.\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (bnc#1136424)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an unchecked kstrdup of fwstr, which might have allowed an attacker to cause a denial of service (NULL pointer dereference and system crash). (bnc#1136586)\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux kernel allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may have been possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server. (bnc#1120843)\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the unused memory region in the extent tree block, which might have allowed local users to obtain sensitive information by reading uninitialized data in the filesystem. (bnc#1135281)\n- CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603)\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() was called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check had a race condition when reading /proc/pid/stat. (bnc#1132472)\n- CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel There was a race condition leading to a use-after-free, related to net namespace cleanup. (bnc#1134537)\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel It did not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents. (bnc#1110785)\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions. (bnc#1133188)\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bnc#1012382).\n- 9p: do not trust pdu content for stat item size (bnc#1012382).\n- X.509: unpack RSA signatureValue field from BIT STRING (git-fixes).\n- acpi / sbs: Fix GPE storm on recent MacBookPro\u0027s (bnc#1012382).\n- alsa: core: Fix card races between register and disconnect (bnc#1012382).\n- alsa: echoaudio: add a check for ioremap_nocache (bnc#1012382).\n- alsa: info: Fix racy addition/deletion of nodes (bnc#1012382).\n- alsa: line6: use dynamic buffers (bnc#1012382).\n- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bnc#1012382).\n- alsa: pcm: check if ops are defined before suspending PCM (bnc#1012382).\n- alsa: sb8: add a check for request_region (bnc#1012382).\n- alsa: seq: Fix OOB-reads from strlcpy (bnc#1012382).\n- appletalk: Fix compile regression (bnc#1012382).\n- appletalk: Fix use-after-free in atalk_proc_exit (bnc#1012382).\n- arm64/kernel: do not ban ADRP to work around Cortex-A53 erratum #843419 (bsc#1126040).\n- arm64/kernel: rename module_emit_adrp_veneer-\u003emodule_emit_veneer_for_adrp (bsc#1126040).\n- arm64: Add helper to decode register from instruction (bsc#1126040).\n- arm64: debug: Do not propagate UNKNOWN FAR into si_code for debug signals (bnc#1012382).\n- arm64: debug: Ensure debug handlers check triggering exception level (bnc#1012382).\n- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (bnc#1012382).\n- arm64: futex: Restore oldval initialization to work around buggy compilers (bnc#1012382).\n- arm64: module-plts: factor out PLT generation code for ftrace (bsc#1126040).\n- arm64: module: do not BUG when exceeding preallocated PLT count (bsc#1126040).\n- arm64: module: split core and init PLT sections (bsc#1126040).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bnc#1012382).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bnc#1012382).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bnc#1012382).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bnc#1012382).\n- arm: dts: at91: Fix typo in ISC_D0 on PC9 (bnc#1012382).\n- arm: dts: pfla02: increase phy reset duration (bnc#1012382).\n- arm: iop: do not use using 64-bit DMA masks (bnc#1012382).\n- arm: orion: do not use using 64-bit DMA masks (bnc#1012382).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bnc#1012382).\n- asoc: Intel: avoid Oops if DMA setup fails (bnc#1012382).\n- asoc: cs4270: Set auto-increment bit for register writes (bnc#1012382).\n- asoc: fsl-asoc-card: fix object reference leaks in fsl_asoc_card_probe (bnc#1012382).\n- asoc: fsl_esai: fix channel swap issue when stream starts (bnc#1012382).\n- asoc: tlv320aic32x4: Fix Common Pins (bnc#1012382).\n- asoc:soc-pcm:fix a codec fixup issue in TDM case (bnc#1012382).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1106929)\n- bcache: Move couple of functions to sysfs.c (bsc#1130972).\n- bcache: Move couple of string arrays to sysfs.c (bsc#1130972).\n- bcache: Populate writeback_rate_minimum attribute (bsc#1130972).\n- bcache: account size of buckets used in uuid write to ca-\u003emeta_sectors_written (bsc#1130972).\n- bcache: add MODULE_DESCRIPTION information (bsc#1130972).\n- bcache: add a comment in super.c (bsc#1130972).\n- bcache: add code comments for bset.c (bsc#1130972).\n- bcache: add comment for cache_set-\u003efill_iter (bsc#1130972).\n- bcache: add identifier names to arguments of function definitions (bsc#1130972).\n- bcache: add missing SPDX header (bsc#1130972).\n- bcache: add separate workqueue for journal_write to avoid deadlock (bsc#1130972).\n- bcache: add static const prefix to char * array declarations (bsc#1130972).\n- bcache: add sysfs_strtoul_bool() for setting bit-field variables (bsc#1130972).\n- bcache: add the missing comments for smp_mb()/smp_wmb() (bsc#1130972).\n- bcache: cannot set writeback_running via sysfs if no writeback kthread created (bsc#1130972).\n- bcache: comment on direct access to bvec table (bsc#1130972).\n- bcache: correct dirty data statistics (bsc#1130972).\n- bcache: do not assign in if condition in bcache_device_init() (bsc#1130972).\n- bcache: do not assign in if condition in bcache_init() (bsc#1130972).\n- bcache: do not assign in if condition register_bcache() (bsc#1130972).\n- bcache: do not check NULL pointer before calling kmem_cache_destroy (bsc#1130972).\n- bcache: do not check if debug dentry is ERR or NULL explicitly on remove (bsc#1130972).\n- bcache: do not clone bio in bch_data_verify (bsc#1130972).\n- bcache: do not mark writeback_running too early (bsc#1130972).\n- bcache: export backing_dev_name via sysfs (bsc#1130972).\n- bcache: export backing_dev_uuid via sysfs (bsc#1130972).\n- bcache: fix code comments style (bsc#1130972).\n- bcache: fix indent by replacing blank by tabs (bsc#1130972).\n- bcache: fix indentation issue, remove tabs on a hunk of code (bsc#1130972).\n- bcache: fix input integer overflow of congested threshold (bsc#1130972).\n- bcache: fix input overflow to cache set sysfs file io_error_halflife (bnc#1012382).\n- bcache: fix input overflow to journal_delay_ms (bsc#1130972).\n- bcache: fix input overflow to sequential_cutoff (bnc#1012382).\n- bcache: fix input overflow to writeback_delay (bsc#1130972).\n- bcache: fix input overflow to writeback_rate_minimum (bsc#1130972).\n- bcache: fix ioctl in flash device (bsc#1130972).\n- bcache: fix mistaken code comments in bcache.h (bsc#1130972).\n- bcache: fix mistaken comments in request.c (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_i_term_inverse (bsc#1130972).\n- bcache: fix potential div-zero error of writeback_rate_p_term_inverse (bsc#1130972).\n- bcache: fix typo \u0027succesfully\u0027 to \u0027successfully\u0027 (bsc#1130972).\n- bcache: fix typo in code comments of closure_return_with_destructor() (bsc#1130972).\n- bcache: improve sysfs_strtoul_clamp() (bnc#1012382).\n- bcache: introduce force_wake_up_gc() (bsc#1130972).\n- bcache: make cutoff_writeback and cutoff_writeback_sync tunable (bsc#1130972).\n- bcache: move open brace at end of function definitions to next line (bsc#1130972).\n- bcache: never writeback a discard operation (bsc#1130972).\n- bcache: not use hard coded memset size in bch_cache_accounting_clear() (bsc#1130972).\n- bcache: option to automatically run gc thread after writeback (bsc#1130972).\n- bcache: panic fix for making cache device (bsc#1130972).\n- bcache: prefer \u0027help\u0027 in Kconfig (bsc#1130972).\n- bcache: print number of keys in trace_bcache_journal_write (bsc#1130972).\n- bcache: recal cached_dev_sectors on detach (bsc#1130972).\n- bcache: remove unnecessary space before ioctl function pointer arguments (bsc#1130972).\n- bcache: remove unused bch_passthrough_cache (bsc#1130972).\n- bcache: remove useless parameter of bch_debug_init() (bsc#1130972).\n- bcache: replace \u0027%pF\u0027 by \u0027%pS\u0027 in seq_printf() (bsc#1130972).\n- bcache: replace Symbolic permissions by octal permission numbers (bsc#1130972).\n- bcache: replace hard coded number with BUCKET_GC_GEN_MAX (bsc#1130972).\n- bcache: replace printk() by pr_*() routines (bsc#1130972).\n- bcache: set writeback_percent in a flexible range (bsc#1130972).\n- bcache: split combined if-condition code into separate ones (bsc#1130972).\n- bcache: stop using the deprecated get_seconds() (bsc#1130972).\n- bcache: style fix to add a blank line after declarations (bsc#1130972).\n- bcache: style fix to replace \u0027unsigned\u0027 by \u0027unsigned int\u0027 (bsc#1130972).\n- bcache: style fixes for lines over 80 characters (bsc#1130972).\n- bcache: trace missed reading by cache_missed (bsc#1130972).\n- bcache: treat stale and dirty keys as bad keys (bsc#1130972).\n- bcache: trivial - remove tailing backslash in macro BTREE_FLAG (bsc#1130972).\n- bcache: update comment for bch_data_insert (bsc#1130972).\n- bcache: use (REQ_META|REQ_PRIO) to indicate bio for metadata (bsc#1130972).\n- bcache: use MAX_CACHES_PER_SET instead of magic number 8 in __bch_bucket_alloc_set (bsc#1130972).\n- bcache: use REQ_PRIO to indicate bio for metadata (bsc#1130972).\n- bcache: use routines from lib/crc64.c for CRC64 calculation (bsc#1130972).\n- bcache: use sysfs_strtoul_bool() to set bit-field variables (bsc#1130972).\n- bcache: writeback: properly order backing device IO (bsc#1130972).\n- binfmt_elf: switch to new creds when switching to new mm (bnc#1012382).\n- bitops: avoid integer overflow in GENMASK(_ULL) (bnc#1012382).\n- block: check_events: do not bother with events if unsupported (bsc#1110946).\n- block: disk_events: introduce event flags (bsc#1110946).\n- block: do not leak memory in bio_copy_user_iov() (bnc#1012382).\n- block: fix use-after-free on gendisk (bsc#1136448).\n- bluetooth: Align minimum encryption key size for LE and BR/EDR connections (bnc#1012382).\n- bluetooth: Fix decrementing reference count twice in releasing socket (bnc#1012382).\n- bnxt_en: Improve multicast address setup logic (bnc#1012382).\n- bonding: fix arp_validate toggling in active-backup mode (bnc#1012382).\n- bonding: fix event handling for stacked bonds (bnc#1012382).\n- bonding: show full hw address in sysfs for slave entries (bnc#1012382).\n- bpf: reject wrong sized filters earlier (bnc#1012382).\n- bridge: Fix error path for kobject_init_and_add() (bnc#1012382).\n- btrfs: Do not panic when we can\u0027t find a root key (bsc#1112063).\n- btrfs: Factor out common delayed refs init code (bsc#1134813).\n- btrfs: Introduce init_delayed_ref_head (bsc#1134813).\n- btrfs: Open-code add_delayed_data_ref (bsc#1134813).\n- btrfs: Open-code add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_data_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_common in add_delayed_tree_ref (bsc#1134813).\n- btrfs: Use init_delayed_ref_head in add_delayed_ref_head (bsc#1134813).\n- btrfs: add a helper to return a head ref (bsc#1134813).\n- btrfs: breakout empty head cleanup to a helper (bsc#1134813).\n- btrfs: delayed-ref: Introduce better documented delayed ref structures (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Open-code process_func in __btrfs_mod_ref (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: move all ref head cleanup to the helper function (bsc#1134813).\n- btrfs: move extent_op cleanup to a helper (bsc#1134813).\n- btrfs: move ref_mod modification into the if (ref) logic (bsc#1134813).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: qgroup: Move reserved data accounting from btrfs_delayed_ref_head to btrfs_qgroup_extent_record (bsc#1134162).\n- btrfs: qgroup: Remove duplicated trace points for qgroup_rsv_add/release (bsc#1134160).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1134338).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1134651).\n- btrfs: remove delayed_ref_node from ref_head (bsc#1134813).\n- btrfs: split delayed ref head initialization and addition (bsc#1134813).\n- btrfs: track refs in a rb_tree instead of a list (bsc#1134813).\n- cdc-acm: cleaning up debug in data submission path (bsc#1136539).\n- cdc-acm: fix race between reset and control messaging (bsc#1106110).\n- cdc-acm: handle read pipe errors (bsc#1135878).\n- cdc-acm: reassemble fragmented notifications (bsc#1136590).\n- cdc-acm: store in and out pipes in acm structure (bsc#1136575).\n- cdrom: Fix race condition in cdrom_sysctl_register (bnc#1012382).\n- ceph: ensure d_name stability in ceph_dentry_hash() (bsc#1134564).\n- ceph: fix ci-\u003ei_head_snapc leak (bsc#1122776).\n- ceph: fix use-after-free on symlink traversal (bsc#1134565).\n- ceph: only use d_name directly when parent is locked (bsc#1134566).\n- cifs: Fix NULL pointer dereference of devname (bnc#1012382).\n- cifs: do not attempt cifs operation on smb2+ rename error (bnc#1012382).\n- cifs: fallback to older infolevels on findfirst queryinfo retry (bnc#1012382).\n- cifs: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- cifs: use correct format characters (bnc#1012382).\n- clk: fix mux clock documentation (bsc#1090888).\n- coresight: etm4x: Add support to enable ETMv4.2 (bnc#1012382).\n- cpu/speculation: Add \u0027mitigations=\u0027 cmdline option (bnc#1012382 bsc#1112178).\n- cpupower: remove stringop-truncation waring (bsc#1119086).\n- crypto: crypto4xx - properly set IV after de- and encrypt (bnc#1012382).\n- crypto: sha256/arm - fix crash bug in Thumb2 build (bnc#1012382).\n- crypto: sha512/arm - fix crash bug in Thumb2 build (bnc#1012382).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1135661, bsc#1137162).\n- crypto: vmx - fix copy-paste error in CTR mode (bsc#1135661, bsc#1137162).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- crypto: vmx: Only call enable_kernel_vsx() (bsc#1135661, bsc#1137162).\n- crypto: x86/poly1305 - fix overflow during partial reduction (bnc#1012382).\n- debugfs: fix use-after-free on symlink traversal (bnc#1012382).\n- device_cgroup: fix RCU imbalance in error case (bnc#1012382).\n- dm thin: add sanity checks to thin-pool and external snapshot creation (bnc#1012382).\n- dmaengine: imx-dma: fix warning comparison of distinct pointer types (bnc#1012382).\n- dmaengine: tegra: avoid overflow of byte tracking (bnc#1012382).\n- documentation: Add MDS vulnerability documentation (bnc#1012382).\n- documentation: Add nospectre_v1 parameter (bnc#1012382).\n- documentation: Correct the possible MDS sysfs values (bnc#1012382).\n- documentation: Move L1TF to separate directory (bnc#1012382).\n- drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl (bnc#1012382).\n- drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl (bnc#1012382).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1106929)\n- drm/dp/mst: Configure no_stop_bit correctly for remote i2c xfers (bnc#1012382).\n- drm/fb-helper: dpms_legacy(): Only set on connectors in use (bnc#1106929)\n- drm/i915: Fix I915_EXEC_RING_MASK (bnc#1106929)\n- drm/rockchip: shutdown drm subsystem on shutdown (bsc#1106929)\n- drm/ttm: Remove warning about inconsistent mapping information (bnc#1131488)\n- drm/vc4: -\u003ex_scaling[1] should never be set to VC4_SCALING_NONE (bsc#1106929)\n- drm/vc4: Account for interrupts in flight (bsc#1106929)\n- drm/vc4: Allocate the right amount of space for boot-time CRTC state. (bsc#1106929)\n- drm/vc4: Fix NULL pointer dereference in vc4_save_hang_state() (bsc#1106929)\n- drm/vc4: Fix OOPSes from trying to cache a partially constructed BO. (bsc#1106929)\n- drm/vc4: Fix a couple error codes in vc4_cl_lookup_bos() (bsc#1106929)\n- drm/vc4: Fix compilation error reported by kbuild test bot (bsc#1106929)\n- drm/vc4: Fix memory leak during gpu reset. (bsc#1106929)\n- drm/vc4: Fix memory leak of the CRTC state. (bsc#1106929)\n- drm/vc4: Fix oops when userspace hands in a bad BO. (bsc#1106929)\n- drm/vc4: Fix overflow mem unreferencing when the binner runs dry. (bsc#1106929)\n- drm/vc4: Fix races when the CS reads from render targets. (bsc#1106929)\n- drm/vc4: Fix scaling of uni-planar formats (bsc#1106929)\n- drm/vc4: Fix the \u0027no scaling\u0027 case on multi-planar YUV formats (bsc#1106929)\n- drm/vc4: Flush the caches before the bin jobs, as well. (bsc#1106929)\n- drm/vc4: Free hang state before destroying BO cache. (bsc#1106929)\n- drm/vc4: Move IRQ enable to PM path (bsc#1106929)\n- drm/vc4: Reset -\u003e{x, y}_scaling[1] when dealing with uniplanar (bsc#1106929)\n- drm/vc4: Set -\u003eis_yuv to false when num_planes == 1 (bsc#1106929)\n- drm/vc4: Use drm_free_large() on handles to match its allocation. (bsc#1106929)\n- drm/vc4: fix a bounds check (bsc#1106929)\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1106929)\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to (bsc#1106929)\n- dt-bindings: rcar-dmac: Document missing error interrupt (bsc#1085535).\n- e1000e: Add Support for 38.4MHZ frequency (bsc#1108293 ).\n- e1000e: Add Support for CannonLake (bsc#1108293).\n- e1000e: Fix -Wformat-truncation warnings (bnc#1012382).\n- e1000e: Initial Support for CannonLake (bsc#1108293 ).\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bnc#1012382).\n- exportfs: fix \u0027passing zero to ERR_PTR()\u0027 warning (bsc#1136458).\n- ext4: Return EAGAIN in case of DIO is beyond end of file (bsc#1136810).\n- ext4: actually request zeroing of inode table after grow (bsc#1136451).\n- ext4: add missing brelse() in add_new_gdb_meta_bg() (bnc#1012382).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: cleanup bh release code in ext4_ind_remove_space() (bnc#1012382).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1136452).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1136449).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1136623).\n- ext4: prohibit fstrim in norecovery mode (bnc#1012382).\n- ext4: report real fs size after failed resize (bnc#1012382).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- f2fs: do not use mutex lock in atomic context (bnc#1012382).\n- f2fs: fix to do sanity check with current segment number (bnc#1012382).\n- fbdev: fbmem: fix memory access if logo is bigger than the screen (bnc#1012382).\n- fix incorrect error code mapping for OBJECTID_NOT_FOUND (bnc#1012382).\n- fs/file.c: initialize init_files.resize_wait (bnc#1012382).\n- fs/proc/proc_sysctl.c: Fix a NULL pointer dereference (bnc#1012382).\n- fs: fix guard_bio_eod to check for real EOD errors (bnc#1012382).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- genirq: Prevent use-after-free and work list corruption (bnc#1012382).\n- genirq: Respect IRQCHIP_SKIP_SET_WAKE in irq_chip_set_wake_parent() (bnc#1012382).\n- gpio: gpio-omap: fix level interrupt idling (bnc#1012382).\n- gpu: ipu-v3: dp: fix CSC handling (bnc#1012382).\n- h8300: use cc-cross-prefix instead of hardcoding h8300-unknown-linux- (bnc#1012382).\n- hid: debug: fix race condition with between rdesc_show() and device removal (bnc#1012382).\n- hid: input: add mapping for Expose/Overview key (bnc#1012382).\n- hid: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bnc#1012382).\n- hugetlbfs: fix memory leak for resv_map (bnc#1012382).\n- hwrng: virtio - Avoid repeated init of completion (bnc#1012382).\n- i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA (bnc#1012382).\n- ib/hfi1: Eliminate opcode tests on mr deref ().\n- ib/hfi1: Unreserve a reserved request when it is completed ().\n- ib/mlx4: Fix race condition between catas error reset and aliasguid flows (bnc#1012382).\n- ib/mlx4: Increase the timeout for CM cache (bnc#1012382).\n- ib/rdmavt: Add wc_flags and wc_immdata to cq entry trace ().\n- ib/rdmavt: Fix frwr memory registration ().\n- igb: Fix WARN_ONCE on runtime suspend (bnc#1012382).\n- iio/gyro/bmg160: Use millidegrees for temperature scale (bnc#1012382).\n- iio: ad_sigma_delta: select channel when reading register (bnc#1012382).\n- iio: adc: at91: disable adc channel interrupt in timeout case (bnc#1012382).\n- iio: adc: xilinx: fix potential use-after-free on remove (bnc#1012382).\n- include/linux/bitrev.h: fix constant bitrev (bnc#1012382).\n- include/linux/swap.h: use offsetof() instead of custom __swapoffset macro (bnc#1012382).\n- init: initialize jump labels before command line option parsing (bnc#1012382).\n- input: snvs_pwrkey - initialize necessary driver data before enabling IRQ (bnc#1012382).\n- io: accel: kxcjk1013: restore the range after resume (bnc#1012382).\n- iommu/vt-d: Do not request page request irq under dmar_global_lock (bsc#1135013).\n- iommu/vt-d: Make kernel parameter igfx_off work with vIOMMU (bsc#1135014).\n- iommu/vt-d: Set intel_iommu_gfx_mapped correctly (bsc#1135015).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (bnc#1012382).\n- ipmi:ssif: compare block number correctly for multi-part return messages (bsc#1135120).\n- ipv4: Fix raw socket lookup for local traffic (bnc#1012382).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (bnc#1012382).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (bnc#1012382).\n- ipv4: recompile ip options in ipv4_link_failure (bnc#1012382).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (bnc#1012382).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (bnc#1012382).\n- ipv6: Fix dangling pointer when ipv6 fragment (bnc#1012382).\n- ipv6: fix a potential deadlock in do_ipv6_setsockopt() (bnc#1012382).\n- ipv6: invert flowlabel sharing check in process and user mode (bnc#1012382).\n- ipv6: sit: reset ip header pointer in ipip6_rcv (bnc#1012382).\n- ipvs: do not schedule icmp errors from tunnels (bnc#1012382).\n- jffs2: fix use-after-free on symlink traversal (bnc#1012382).\n- kABI: protect ring_buffer_read_prepare (kabi).\n- kABI: protect struct tlb_state (kabi).\n- kABI: protect struct usb_interface (kabi).\n- kABI: restore ___ptrace_may_access (kabi).\n- kABI: restore icmp_send (kabi).\n- kabi: arm64: fix kabi breakage on arch specific module (bsc#1126040)\n- kabi: drop LINUX_Mib_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kbuild: clang: choose GCC_TOOLCHAIN_DIR not on LD (bnc#1012382).\n- kbuild: simplify ld-option implementation (bnc#1012382).\n- kconfig/[mn]conf: handle backspace (^H) key (bnc#1012382).\n- kconfig: display recursive dependency resolution hint just once (bsc#1100132).\n- kernel/sysctl.c: fix out-of-bounds access when setting file-max (bnc#1012382).\n- keys: Timestamp new keys (bsc#1120902).\n- kprobes: Fix error check when reusing optimized probes (bnc#1012382).\n- kprobes: Mark ftrace mcount handler functions nokprobe (bnc#1012382).\n- kprobes: Prohibit probing on bsearch() (bnc#1012382).\n- kvm: fail KVM_SET_VCPU_EVENTS with invalid exception number (bnc#1012382).\n- kvm: x86: Do not clear EFER during SMM transitions for 32-bit vCPU (bnc#1012382).\n- kvm: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing (bnc#1012382).\n- leds: lp55xx: fix null deref on firmware load failure (bnc#1012382).\n- lib/div64.c: off by one in shift (bnc#1012382).\n- lib/int_sqrt: optimize initial value compute (bnc#1012382).\n- lib/string.c: implement a basic bcmp (bnc#1012382).\n- lib: add crc64 calculation routines (bsc#1130972).\n- lib: do not depend on linux headers being installed (bsc#1130972).\n- libata: fix using DMA buffers on stack (bnc#1012382).\n- libnvdimm/btt: Fix a kmemdup failure check (bnc#1012382).\n- lpfc: validate command in lpfc_sli4_scmd_to_wqidx_distr() (bsc#1129138).\n- mac80211: do not call driver wake_tx_queue op during reconfig (bnc#1012382).\n- mac80211_hwsim: validate number of different channels (bsc#1085539).\n- md: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1132212).\n- media: mt9m111: set initial frame size other than 0x0 (bnc#1012382).\n- media: mx2_emmaprp: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: pvrusb2: Prevent a buffer overflow (bsc#1135642).\n- media: s5p-g2d: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bnc#1012382).\n- media: s5p-jpeg: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: sh_veu: Correct return type for mem2mem buffer helpers (bnc#1012382).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bnc#1012382).\n- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1120902).\n- mips: scall64-o32: Fix indirect syscall number load (bnc#1012382).\n- mm/cma.c: cma_declare_contiguous: correct err handling (bnc#1012382).\n- mm/page_ext.c: fix an imbalance with kmemleak (bnc#1012382).\n- mm/slab.c: kmemleak no scan alien caches (bnc#1012382).\n- mm/vmalloc.c: fix kernel BUG at mm/vmalloc.c:512! (bnc#1012382).\n- mm/vmstat.c: fix /proc/vmstat format for CONFIG_DEBUG_TLBFLUSH=y CONFIG_SMP=n (bnc#1012382).\n- mm: mempolicy: make mbind() return -EIO when MPOL_MF_STRICT is specified (bnc#1012382).\n- mmc: davinci: remove extraneous __init annotation (bnc#1012382).\n- mmc: omap: fix the maximum timeout setting (bnc#1012382).\n- modpost: file2alias: check prototype of handler (bnc#1012382).\n- modpost: file2alias: go back to simple devtable lookup (bnc#1012382).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mt7601u: bump supported EEPROM version (bnc#1012382).\n- mtd: Fix comparison in map_word_andequal() (git-fixes).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- net/ibmvnic: Update MAC address settings after adapter reset (bsc#1134760).\n- net/ibmvnic: Update carrier state after link state change (bsc#1135100).\n- net: atm: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- net: bridge: multicast: use rcu to access port list from br_multicast_start_querier (bnc#1012382).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1117562).\n- net: ethernet: ti: fix possible object reference leak (bnc#1012382).\n- net: ethtool: not call vzalloc for zero sized memory request (bnc#1012382).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (bnc#1012382).\n- net: hns: Fix WARNING when remove HNS driver with SMMU enabled (bnc#1012382).\n- net: hns: Use NAPI_POLL_WEIGHT for hns driver (bnc#1012382).\n- net: ibm: fix possible object reference leak (bnc#1012382).\n- net: ks8851: Delay requesting IRQ until opened (bnc#1012382).\n- net: ks8851: Dequeue RX packets explicitly (bnc#1012382).\n- net: ks8851: Reassert reset pin if chip ID check fails (bnc#1012382).\n- net: ks8851: Set initial carrier state to down (bnc#1012382).\n- net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock() (bnc#1012382).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (bnc#1012382).\n- net: ucc_geth - fix Oops when changing number of buffers in the ring (bnc#1012382).\n- net: xilinx: fix possible object reference leak (bnc#1012382).\n- netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING (bnc#1012382).\n- netfilter: compat: initialize all fields in xt_init (bnc#1012382).\n- netfilter: ebtables: CONFIG_COMPAT: drop a bogus WARN_ON (bnc#1012382).\n- netfilter: physdev: relax br_netfilter dependency (bnc#1012382).\n- netns: provide pure entropy for net_hash_mix() (bnc#1012382).\n- nfs/pnfs: Bulk destroy of layouts needs to be safe w.r.t. umount (git-fixes).\n- nfs: Add missing encode / decode sequence_maxsz to v4.2 operations (git-fixes).\n- nfs: Fix I/O request leakages (git-fixes).\n- nfs: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (bnc#1012382).\n- nfs: clean up rest of reqs when failing to add one (git-fixes).\n- nfsd: Do not release the callback slot unless it was actually held (bnc#1012382).\n- ntp: Allow TAI-UTC offset to be set to zero (bsc#1135642).\n- nvme-fc: resolve io failures during connect (bsc#1116803).\n- nvme: Do not allow to reset a reconnecting controller (bsc#1133874).\n- ocfs2: fix a panic problem caused by o2cb_ctl (bnc#1012382).\n- openvswitch: fix flow actions reallocation (bnc#1012382).\n- pNFS: Skip invalid stateids when doing a bulk destroy (git-fixes).\n- packet: Fix error path in packet_init (bnc#1012382).\n- packet: validate msg_namelen in send directly (bnc#1012382).\n- pci: Add function 1 DMA alias quirk for Marvell 9170 SATA controller (bnc#1012382).\n- pci: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1137142).\n- pci: Mark Atheros AR9462 to avoid bus reset (bsc#1135642).\n- pci: xilinx-nwl: Add missing of_node_put() (bsc#1100132).\n- perf evsel: Free evsel-\u003ecounts in perf_evsel__exit() (bnc#1012382).\n- perf test: Fix failure of \u0027evsel-tp-sched\u0027 test on s390 (bnc#1012382).\n- perf tests: Fix a memory leak in test__perf_evsel__tp_sched_test() (bnc#1012382).\n- perf tests: Fix a memory leak of cpu_map object in the openat_syscall_event_on_all_cpus test (bnc#1012382).\n- perf top: Fix error handling in cmd_top() (bnc#1012382).\n- perf/core: Restore mmap record type correctly (bnc#1012382).\n- perf/x86/intel: Allow PEBS multi-entry in watermark mode (git-fixes).\n- perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS (bnc#1012382).\n- platform/x86: sony-laptop: Fix unintentional fall-through (bnc#1012382).\n- powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC (bnc#1012382).\n- powerpc/64: Call setup_barrier_nospec() from setup_arch() (bnc#1012382 bsc#1131107).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bnc#1012382).\n- powerpc/64s: Include cpu header (bnc#1012382).\n- powerpc/booke64: set RI in default MSR (bnc#1012382).\n- powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg (bnc#1012382).\n- powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E (bnc#1012382).\n- powerpc/fsl: Add infrastructure to fixup branch predictor flush (bnc#1012382).\n- powerpc/fsl: Add macro to flush the branch predictor (bnc#1012382).\n- powerpc/fsl: Add nospectre_v2 command line argument (bnc#1012382).\n- powerpc/fsl: Emulate SPRN_BUCSR register (bnc#1012382).\n- powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used (bnc#1012382).\n- powerpc/fsl: Fix the flush of branch predictor (bnc#1012382).\n- powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup\u0027 (bnc#1012382).\n- powerpc/fsl: Flush branch predictor when entering KVM (bnc#1012382).\n- powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) (bnc#1012382).\n- powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) (bnc#1012382).\n- powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms (bnc#1012382).\n- powerpc/fsl: Update Spectre v2 reporting (bnc#1012382).\n- powerpc/lib: fix book3s/32 boot failure due to code patching (bnc#1012382).\n- powerpc/xmon: Add RFI flush related fields to paca dump (bnc#1012382).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1019695 bsc#1019696).\n- qlcnic: Avoid potential NULL pointer dereference (bnc#1012382).\n- qmi_wwan: add Olicard 600 (bnc#1012382).\n- rdma/iw_cxgb4: Fix the unchecked ep dereference (bsc#1005778 bsc#1005780 bsc#1005781).\n- rdma/qedr: Fix out of bounds index check in query pkey (bsc#1022604).\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bnc#1012382).\n- rsi: improve kernel thread handling to fix kernel panic (bnc#1012382).\n- rtc: da9063: set uie_unsupported when relevant (bnc#1012382).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bnc#1012382).\n- s390/3270: fix lockdep false positive on view-\u003elock (bnc#1012382).\n- s390/dasd: Fix capacity calculation for large volumes (bnc#1012382).\n- s390: ctcm: fix ctcm_new_device error return code (bnc#1012382).\n- sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init() (bnc#1012382).\n- sc16is7xx: move label \u0027err_spi\u0027 to correct section (git-fixes).\n- sched/fair: Do not re-read -\u003eh_load_next during hierarchical load calculation (bnc#1012382).\n- sched/fair: Limit sched_cfs_period_timer() loop to avoid hard lockup (bnc#1012382).\n- sched/numa: Fix a possible divide-by-zero (bnc#1012382).\n- sched: Add sched_smt_active() (bnc#1012382).\n- scsi: core: replace GFP_ATOMIC with GFP_KERNEL in scsi_scan.c (bnc#1012382).\n- scsi: csiostor: fix missing data copy in csio_scsi_err_handler() (bnc#1012382).\n- scsi: libsas: fix a race condition when smp task timeout (bnc#1012382).\n- scsi: megaraid_sas: return error when create DMA pool failed (bnc#1012382).\n- scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines (bnc#1012382).\n- scsi: qla4xxx: fix a potential NULL pointer dereference (bnc#1012382).\n- scsi: storvsc: Fix calculation of sub-channel count (bnc#1012382).\n- scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN (bnc#1012382).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (bnc#1012382).\n- selftests/net: correct the return value for run_netsocktests (bnc#1012382).\n- selinux: never allow relabeling on context mounts (bnc#1012382).\n- serial: uartps: console_setup() can\u0027t be placed to init section (bnc#1012382).\n- slip: make slhc_free() silently accept an error pointer (bnc#1012382).\n- soc/tegra: fuse: Fix illegal free of IO base address (bnc#1012382).\n- soc: imx-sgtl5000: add missing put_device() (bnc#1012382).\n- soc: qcom: gsbi: Fix error handling in gsbi_probe() (bnc#1012382).\n- staging: comedi: ni_usb6501: Fix possible double-free of -\u003eusb_rx_buf (bnc#1012382).\n- staging: comedi: ni_usb6501: Fix use of uninitialized mutex (bnc#1012382).\n- staging: comedi: vmk80xx: Fix possible double-free of -\u003eusb_rx_buf (bnc#1012382).\n- staging: comedi: vmk80xx: Fix use of uninitialized semaphore (bnc#1012382).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bnc#1012382).\n- staging: iio: adt7316: fix the dac read calculation (bnc#1012382).\n- staging: iio: adt7316: fix the dac write calculation (bnc#1012382).\n- supported.conf: add lib/crc64 because bcache uses it\n- sysctl: handle overflow for file-max (bnc#1012382).\n- tcp: Ensure DCTCP reacts to losses (bnc#1012382).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (bnc#1012382).\n- team: fix possible recursive locking when add slaves (bnc#1012382).\n- thermal/int340x_thermal: Add additional UUIDs (bnc#1012382).\n- thermal/int340x_thermal: fix mode setting (bnc#1012382).\n- timer/debug: Change /proc/timer_stats from 0644 to 0600 (bnc#1012382).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: handle the err returned from cmd header function (bnc#1012382).\n- tools lib traceevent: Fix buffer overflow in arg_eval (bnc#1012382).\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tools/power turbostat: return the exit status of a command (bnc#1012382).\n- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bnc#1012382).\n- tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete (bnc#1012382).\n- trace: Fix preempt_enable_no_resched() abuse (bnc#1012382).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- tracing: kdb: Fix ftdump to not sleep (bnc#1012382).\n- tty/serial: atmel: Add is_half_duplex helper (bnc#1012382).\n- tty/serial: atmel: RS485 HD w/DMA: enable RX after TX is stopped (bnc#1012382).\n- tty: increase the default flip buffer limit to 2*640K (bnc#1012382).\n- tty: ldisc: add sysctl to prevent autoloading of ldiscs (bnc#1012382).\n- uas: fix alignment of scatter/gather segments (bnc#1012382 bsc#1129770).\n- uas: fix alignment of scatter/gather segments (bsc#1129770).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1136455).\n- usb: Add new USB LPM helpers (bsc#1129770).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1129770).\n- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n- usb: cdc-acm: fix unthrottle races (bsc#1135642).\n- usb: chipidea: Grab the (legacy) usb PHY by phandle first (bnc#1012382).\n- usb: core: Fix bug caused by duplicate interface PM usage counter (bnc#1012382).\n- usb: core: Fix unterminated string returned by usb_string() (bnc#1012382).\n- usb: dwc3: Fix default lpm_nyet_threshold value (bnc#1012382).\n- usb: gadget: net2272: Fix net2272_dequeue() (bnc#1012382).\n- usb: gadget: net2280: Fix net2280_dequeue() (bnc#1012382).\n- usb: gadget: net2280: Fix overrun of OUT messages (bnc#1012382).\n- usb: serial: fix unthrottle races (bnc#1012382).\n- usb: serial: use variable for status (bnc#1012382).\n- usb: u132-hcd: fix resource leak (bnc#1012382).\n- usb: usbip: fix isoc packet num validation in get_pipe (bnc#1012382).\n- usb: w1 ds2490: Fix bug caused by improper use of altsetting array (bnc#1012382).\n- usb: yurex: Fix protection fault after device removal (bnc#1012382).\n- usbnet: ipheth: fix potential null pointer dereference in ipheth_carrier_set (bnc#1012382).\n- usbnet: ipheth: prevent TX queue timeouts when device not ready (bnc#1012382).\n- vfio/pci: use correct format characters (bnc#1012382).\n- vlan: disable SIOCSHWTSTAMP in container (bnc#1012382).\n- vrf: sit mtu should not be updated when vrf netdev is the link (bnc#1012382).\n- wlcore: Fix memory leak in case wl12xx_fetch_firmware failure (bnc#1012382).\n- x86/Kconfig: Select SCHED_SMT if SMP enabled (bnc#1012382).\n- x86/MCE: Save microcode revision in machine check records (bnc#1012382).\n- x86/bugs: Add AMD\u0027s SPEC_CTRL MSR usage (bnc#1012382).\n- x86/bugs: Change L1TF mitigation string to match upstream (bnc#1012382).\n- x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR (bnc#1012382).\n- x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features (bnc#1012382).\n- x86/build: Mark per-CPU symbols as absolute explicitly for LLD (bnc#1012382).\n- x86/build: Specify elf_i386 linker emulation explicitly for i386 objects (bnc#1012382).\n- x86/cpu/bugs: Use __initconst for \u0027const\u0027 init data (bnc#1012382).\n- x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processors (bnc#1012382).\n- x86/cpufeatures: Hide AMD-specific speculation flags (bnc#1012382).\n- x86/hpet: Prevent potential NULL pointer dereference (bnc#1012382).\n- x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an error (bnc#1012382).\n- x86/kprobes: Verify stack frame on kretprobe (bnc#1012382).\n- x86/mds: Add MDSUM variant to the MDS documentation (bnc#1012382).\n- x86/microcode/intel: Add a helper which gives the microcode revision (bnc#1012382).\n- x86/microcode/intel: Check microcode revision before updating sibling threads (bnc#1012382).\n- x86/microcode: Make sure boot_cpu_data.microcode is up-to-date (bnc#1012382).\n- x86/microcode: Update the new microcode revision unconditionally (bnc#1012382).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bnc#1012382).\n- x86/process: Consolidate and simplify switch_to_xtra() code (bnc#1012382).\n- x86/speculataion: Mark command line parser data __initdata (bnc#1012382).\n- x86/speculation/l1tf: Document l1tf in sysfs (bnc#1012382).\n- x86/speculation/mds: Fix comment (bnc#1012382).\n- x86/speculation/mds: Fix documentation typo (bnc#1012382).\n- x86/speculation: Add command line control for indirect branch speculation (bnc#1012382).\n- x86/speculation: Add prctl() control for indirect branch speculation (bnc#1012382).\n- x86/speculation: Add seccomp Spectre v2 user space protection mode (bnc#1012382).\n- x86/speculation: Avoid __switch_to_xtra() calls (bnc#1012382).\n- x86/speculation: Clean up spectre_v2_parse_cmdline() (bnc#1012382).\n- x86/speculation: Disable STibP when enhanced IBRS is in use (bnc#1012382).\n- x86/speculation: Enable prctl mode for spectre_v2_user (bnc#1012382).\n- x86/speculation: Mark string arrays const correctly (bnc#1012382).\n- x86/speculation: Move STIPB/ibPB string conditionals out of cpu_show_common() (bnc#1012382).\n- x86/speculation: Prepare arch_smt_update() for PRCTL mode (bnc#1012382).\n- x86/speculation: Prepare for conditional ibPB in switch_mm() (bnc#1012382).\n- x86/speculation: Prepare for per task indirect branch speculation control (bnc#1012382).\n- x86/speculation: Prevent stale SPEC_CTRL msr content (bnc#1012382).\n- x86/speculation: Provide ibPB always command line options (bnc#1012382).\n- x86/speculation: Remove SPECTRE_V2_ibRS in enum spectre_v2_mitigation (bnc#1012382).\n- x86/speculation: Remove unnecessary ret variable in cpu_show_common() (bnc#1012382).\n- x86/speculation: Rename SSBD update functions (bnc#1012382).\n- x86/speculation: Reorder the spec_v2 code (bnc#1012382).\n- x86/speculation: Reorganize speculation control MSRs update (bnc#1012382).\n- x86/speculation: Split out TIF update (bnc#1012382).\n- x86/speculation: Support \u0027mitigations=\u0027 cmdline option (bnc#1012382 bsc#1112178).\n- x86/speculation: Support Enhanced ibRS on future CPUs (bnc#1012382).\n- x86/speculation: Unify conditional spectre v2 print functions (bnc#1012382).\n- x86/speculation: Update the TIF_SSBD comment (bnc#1012382).\n- x86/vdso: Drop implicit common-page-size linker flag (bnc#1012382).\n- x86/vdso: Pass --eh-frame-hdr to the linker (git-fixes).\n- x86: vdso: Use $LD instead of $CC to link (bnc#1012382).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- xen: Prevent buffer overflow in privcmd ioctl (bnc#1012382).\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xsysace: Fix error handling in ace_setup (bnc#1012382).\n- xtensa: fix return_address (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1532,SUSE-SLE-DESKTOP-12-SP3-2019-1532,SUSE-SLE-HA-12-SP3-2019-1532,SUSE-SLE-Live-Patching-12-SP3-2019-1532,SUSE-SLE-SDK-12-SP3-2019-1532,SUSE-SLE-SERVER-12-SP3-2019-1532,SUSE-SLE-WE-12-SP3-2019-1532",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1532-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1532-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1532-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1005780",
"url": "https://bugzilla.suse.com/1005780"
},
{
"category": "self",
"summary": "SUSE Bug 1005781",
"url": "https://bugzilla.suse.com/1005781"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1019696",
"url": "https://bugzilla.suse.com/1019696"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1085539",
"url": "https://bugzilla.suse.com/1085539"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1100132",
"url": "https://bugzilla.suse.com/1100132"
},
{
"category": "self",
"summary": "SUSE Bug 1106110",
"url": "https://bugzilla.suse.com/1106110"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1106929",
"url": "https://bugzilla.suse.com/1106929"
},
{
"category": "self",
"summary": "SUSE Bug 1108293",
"url": "https://bugzilla.suse.com/1108293"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1110946",
"url": "https://bugzilla.suse.com/1110946"
},
{
"category": "self",
"summary": "SUSE Bug 1112063",
"url": "https://bugzilla.suse.com/1112063"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1116803",
"url": "https://bugzilla.suse.com/1116803"
},
{
"category": "self",
"summary": "SUSE Bug 1117562",
"url": "https://bugzilla.suse.com/1117562"
},
{
"category": "self",
"summary": "SUSE Bug 1119086",
"url": "https://bugzilla.suse.com/1119086"
},
{
"category": "self",
"summary": "SUSE Bug 1120642",
"url": "https://bugzilla.suse.com/1120642"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122776",
"url": "https://bugzilla.suse.com/1122776"
},
{
"category": "self",
"summary": "SUSE Bug 1126040",
"url": "https://bugzilla.suse.com/1126040"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1129138",
"url": "https://bugzilla.suse.com/1129138"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130972",
"url": "https://bugzilla.suse.com/1130972"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1131488",
"url": "https://bugzilla.suse.com/1131488"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1132212",
"url": "https://bugzilla.suse.com/1132212"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1133188",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "self",
"summary": "SUSE Bug 1133874",
"url": "https://bugzilla.suse.com/1133874"
},
{
"category": "self",
"summary": "SUSE Bug 1134160",
"url": "https://bugzilla.suse.com/1134160"
},
{
"category": "self",
"summary": "SUSE Bug 1134162",
"url": "https://bugzilla.suse.com/1134162"
},
{
"category": "self",
"summary": "SUSE Bug 1134338",
"url": "https://bugzilla.suse.com/1134338"
},
{
"category": "self",
"summary": "SUSE Bug 1134537",
"url": "https://bugzilla.suse.com/1134537"
},
{
"category": "self",
"summary": "SUSE Bug 1134564",
"url": "https://bugzilla.suse.com/1134564"
},
{
"category": "self",
"summary": "SUSE Bug 1134565",
"url": "https://bugzilla.suse.com/1134565"
},
{
"category": "self",
"summary": "SUSE Bug 1134566",
"url": "https://bugzilla.suse.com/1134566"
},
{
"category": "self",
"summary": "SUSE Bug 1134651",
"url": "https://bugzilla.suse.com/1134651"
},
{
"category": "self",
"summary": "SUSE Bug 1134760",
"url": "https://bugzilla.suse.com/1134760"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134813",
"url": "https://bugzilla.suse.com/1134813"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1135013",
"url": "https://bugzilla.suse.com/1135013"
},
{
"category": "self",
"summary": "SUSE Bug 1135014",
"url": "https://bugzilla.suse.com/1135014"
},
{
"category": "self",
"summary": "SUSE Bug 1135015",
"url": "https://bugzilla.suse.com/1135015"
},
{
"category": "self",
"summary": "SUSE Bug 1135100",
"url": "https://bugzilla.suse.com/1135100"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135878",
"url": "https://bugzilla.suse.com/1135878"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136448",
"url": "https://bugzilla.suse.com/1136448"
},
{
"category": "self",
"summary": "SUSE Bug 1136449",
"url": "https://bugzilla.suse.com/1136449"
},
{
"category": "self",
"summary": "SUSE Bug 1136451",
"url": "https://bugzilla.suse.com/1136451"
},
{
"category": "self",
"summary": "SUSE Bug 1136452",
"url": "https://bugzilla.suse.com/1136452"
},
{
"category": "self",
"summary": "SUSE Bug 1136455",
"url": "https://bugzilla.suse.com/1136455"
},
{
"category": "self",
"summary": "SUSE Bug 1136458",
"url": "https://bugzilla.suse.com/1136458"
},
{
"category": "self",
"summary": "SUSE Bug 1136539",
"url": "https://bugzilla.suse.com/1136539"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136575",
"url": "https://bugzilla.suse.com/1136575"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136590",
"url": "https://bugzilla.suse.com/1136590"
},
{
"category": "self",
"summary": "SUSE Bug 1136623",
"url": "https://bugzilla.suse.com/1136623"
},
{
"category": "self",
"summary": "SUSE Bug 1136810",
"url": "https://bugzilla.suse.com/1136810"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137142",
"url": "https://bugzilla.suse.com/1137142"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 843419",
"url": "https://bugzilla.suse.com/843419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11486 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11486/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-17T17:21:28Z",
"generator": {
"date": "2019-06-17T17:21:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1532-1",
"initial_release_date": "2019-06-17T17:21:28Z",
"revision_history": [
{
"date": "2019-06-17T17:21:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.97.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.97.1.aarch64",
"product_id": "kernel-default-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.97.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.97.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.97.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.97.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.97.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.97.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.97.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.97.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.97.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.97.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.97.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.97.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.97.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.97.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.97.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.97.1.noarch",
"product_id": "kernel-devel-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.97.1.noarch",
"product_id": "kernel-docs-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.97.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.97.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.97.1.noarch",
"product_id": "kernel-macros-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.97.1.noarch",
"product_id": "kernel-source-4.4.180-94.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.97.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.97.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.97.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.97.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.97.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.97.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.97.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.97.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.97.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.97.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.97.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.97.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.97.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.97.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.97.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.97.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.97.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.97.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.97.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.97.1.s390x",
"product_id": "kernel-syms-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.97.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.97.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.97.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.97.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.97.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.97.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.97.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.97.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.97.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.97.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.97.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.97.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.97.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.97.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.97.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.97.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.97.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.97.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.97.1.x86_64",
"product_id": "kernel-default-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.97.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.97.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.97.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.97.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.97.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.97.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.97.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.97.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.97.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.97.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.97.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"product_id": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.97.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.97.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.97.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.97.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.97.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-docs-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.180-94.97.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.180-94.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11486",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11486"
}
],
"notes": [
{
"category": "general",
"text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11486",
"url": "https://www.suse.com/security/cve/CVE-2019-11486"
},
{
"category": "external",
"summary": "SUSE Bug 1133188 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1133188"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1156434"
},
{
"category": "external",
"summary": "SUSE Bug 1173667 for CVE-2019-11486",
"url": "https://bugzilla.suse.com/1173667"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-11486"
},
{
"cve": "CVE-2019-11815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11815"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11815",
"url": "https://www.suse.com/security/cve/CVE-2019-11815"
},
{
"category": "external",
"summary": "SUSE Bug 1134537 for CVE-2019-11815",
"url": "https://bugzilla.suse.com/1134537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-11815"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_180-94_97-default-1-4.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.180-94.97.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.180-94.97.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.180-94.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-17T17:21:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1692-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 kernel version 3.12.61 was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote\n attacker such that one can trigger an integer overflow, leading to a kernel\n panic. (bsc#1137586).\n\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which\n would fragment the TCP retransmission queue. A remote attacker may have been \n able to further exploit the fragmented queue to cause an expensive linked-list\n walk for subsequent SACKs received for that same TCP connection.\n\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which\n would fragment the RACK send map. A remote attacker may have been able to further\n exploit the fragmented send map to cause an expensive linked-list walk for\n subsequent SACKs received for that same TCP connection. This would have\n resulted in excess resource consumption due to low mss values.\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly\n escalate privileges was found in the mwifiex kernel module while connecting\n to a malicious wireless network. (bnc#1136424)\n\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux\n kernel allowed local attackers to observe page cache access patterns of other\n processes on the same system, potentially allowing sniffing of secret\n information. (Fixing this affects the output of the fincore program.) Limited\n remote exploitation may have been possible, as demonstrated by latency differences\n in accessing public files from an Apache HTTP Server. (bnc#1120843)\n\n- CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out the\n unused memory region in the extent tree block, which might have allowed local users\n to obtain sensitive information by reading uninitialized data in the\n filesystem. (bnc#1135281)\n\n- CVE-2019-11190: The Linux kernel allowed local users to bypass ASLR on setuid\n programs (such as /bin/su) because install_exec_creds() is called too late in\n load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check\n has a race condition when reading /proc/pid/stat. (bnc#1131543)\n\n- CVE-2019-11884: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c\n in the Linux kernel allowed a local user to obtain potentially sensitive\n information from kernel stack memory via a HIDPCONNADD command, because a\n name field may not end with a \u0027\\0\u0027 character. (bnc#1134848)\n\n- CVE-2018-17972: An issue was discovered in the proc_pid_stack function in\n fs/proc/base.c in the Linux kernel It did not ensure that only root may\n inspect the kernel stack of an arbitrary task, allowing a local attacker to\n exploit racy stack unwinding and leak kernel task stack contents.\n (bnc#1110785)\n\nThe following non-security bugs were fixed:\n\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- lib: add \u0027on\u0027/\u0027off\u0027 support to strtobool (bsc#1125931).\n- powerpc/tm: Add commandline option to disable hardware transactional memory (bsc#1125580).\n- powerpc/tm: Add TM Unavailable Exception (bsc#1125580).\n- powerpc/tm: Flip the HTM switch default to disabled (bsc#1125580).\n- powerpc/vdso32: fix CLOCK_MONOTONIC on PPC64 (bsc#1131587).\n- powerpc/vdso64: Fix CLOCK_MONOTONIC inconsistencies across Y2038 (bsc#1131587).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1692,SUSE-SLE-Module-Public-Cloud-12-2019-1692,SUSE-SLE-SERVER-12-2019-1692",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1692-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1692-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191692-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1692-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html"
},
{
"category": "self",
"summary": "SUSE Bug 1090078",
"url": "https://bugzilla.suse.com/1090078"
},
{
"category": "self",
"summary": "SUSE Bug 1110785",
"url": "https://bugzilla.suse.com/1110785"
},
{
"category": "self",
"summary": "SUSE Bug 1113769",
"url": "https://bugzilla.suse.com/1113769"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120885",
"url": "https://bugzilla.suse.com/1120885"
},
{
"category": "self",
"summary": "SUSE Bug 1125580",
"url": "https://bugzilla.suse.com/1125580"
},
{
"category": "self",
"summary": "SUSE Bug 1125931",
"url": "https://bugzilla.suse.com/1125931"
},
{
"category": "self",
"summary": "SUSE Bug 1131543",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "self",
"summary": "SUSE Bug 1131587",
"url": "https://bugzilla.suse.com/1131587"
},
{
"category": "self",
"summary": "SUSE Bug 1132374",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "self",
"summary": "SUSE Bug 1132472",
"url": "https://bugzilla.suse.com/1132472"
},
{
"category": "self",
"summary": "SUSE Bug 1134848",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17972 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11190 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11884 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-24T19:01:10Z",
"generator": {
"date": "2019-06-24T19:01:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1692-1",
"initial_release_date": "2019-06-24T19:01:10Z",
"revision_history": [
{
"date": "2019-06-24T19:01:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.61-52.154.1.aarch64",
"product": {
"name": "kernel-obs-build-3.12.61-52.154.1.aarch64",
"product_id": "kernel-obs-build-3.12.61-52.154.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.61-52.154.1.aarch64",
"product": {
"name": "kernel-obs-qa-3.12.61-52.154.1.aarch64",
"product_id": "kernel-obs-qa-3.12.61-52.154.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.154.1.aarch64",
"product": {
"name": "kernel-syms-3.12.61-52.154.1.aarch64",
"product_id": "kernel-syms-3.12.61-52.154.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.61-52.154.1.noarch",
"product": {
"name": "kernel-devel-3.12.61-52.154.1.noarch",
"product_id": "kernel-devel-3.12.61-52.154.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.61-52.154.1.noarch",
"product": {
"name": "kernel-docs-3.12.61-52.154.1.noarch",
"product_id": "kernel-docs-3.12.61-52.154.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.61-52.154.1.noarch",
"product": {
"name": "kernel-macros-3.12.61-52.154.1.noarch",
"product_id": "kernel-macros-3.12.61-52.154.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.61-52.154.1.noarch",
"product": {
"name": "kernel-source-3.12.61-52.154.1.noarch",
"product_id": "kernel-source-3.12.61-52.154.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.12.61-52.154.1.noarch",
"product": {
"name": "kernel-source-vanilla-3.12.61-52.154.1.noarch",
"product_id": "kernel-source-vanilla-3.12.61-52.154.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-debug-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-debug-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-debug-base-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-debug-base-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-debug-devel-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-debug-devel-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-debug-extra-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-debug-extra-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-default-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-default-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-default-base-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-default-devel-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-default-extra-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-default-extra-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-obs-build-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-obs-qa-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-obs-qa-3.12.61-52.154.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.154.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.61-52.154.1.ppc64le",
"product_id": "kernel-syms-3.12.61-52.154.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-default-3.12.61-52.154.1.s390x",
"product_id": "kernel-default-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-default-base-3.12.61-52.154.1.s390x",
"product_id": "kernel-default-base-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.61-52.154.1.s390x",
"product_id": "kernel-default-devel-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-default-extra-3.12.61-52.154.1.s390x",
"product_id": "kernel-default-extra-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-default-man-3.12.61-52.154.1.s390x",
"product_id": "kernel-default-man-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.61-52.154.1.s390x",
"product_id": "kernel-obs-build-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-obs-qa-3.12.61-52.154.1.s390x",
"product_id": "kernel-obs-qa-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-syms-3.12.61-52.154.1.s390x",
"product_id": "kernel-syms-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-vanilla-3.12.61-52.154.1.s390x",
"product_id": "kernel-vanilla-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-vanilla-devel-3.12.61-52.154.1.s390x",
"product_id": "kernel-vanilla-devel-3.12.61-52.154.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-3.12.61-52.154.1.s390x",
"product": {
"name": "kernel-zfcpdump-3.12.61-52.154.1.s390x",
"product_id": "kernel-zfcpdump-3.12.61-52.154.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-debug-3.12.61-52.154.1.x86_64",
"product_id": "kernel-debug-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-debug-base-3.12.61-52.154.1.x86_64",
"product_id": "kernel-debug-base-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.12.61-52.154.1.x86_64",
"product_id": "kernel-debug-devel-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.12.61-52.154.1.x86_64",
"product_id": "kernel-debug-extra-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-default-3.12.61-52.154.1.x86_64",
"product_id": "kernel-default-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.61-52.154.1.x86_64",
"product_id": "kernel-default-base-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.61-52.154.1.x86_64",
"product_id": "kernel-default-devel-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.61-52.154.1.x86_64",
"product_id": "kernel-default-extra-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.61-52.154.1.x86_64",
"product_id": "kernel-ec2-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.12.61-52.154.1.x86_64",
"product_id": "kernel-ec2-base-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.61-52.154.1.x86_64",
"product_id": "kernel-obs-build-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-obs-qa-3.12.61-52.154.1.x86_64",
"product_id": "kernel-obs-qa-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-syms-3.12.61-52.154.1.x86_64",
"product_id": "kernel-syms-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-vanilla-3.12.61-52.154.1.x86_64",
"product_id": "kernel-vanilla-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.12.61-52.154.1.x86_64",
"product_id": "kernel-vanilla-devel-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-xen-3.12.61-52.154.1.x86_64",
"product_id": "kernel-xen-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.61-52.154.1.x86_64",
"product_id": "kernel-xen-base-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.61-52.154.1.x86_64",
"product_id": "kernel-xen-devel-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.12.61-52.154.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.12.61-52.154.1.x86_64",
"product_id": "kernel-xen-extra-3.12.61-52.154.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.154.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le"
},
"product_reference": "kernel-default-3.12.61-52.154.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.154.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x"
},
"product_reference": "kernel-default-3.12.61-52.154.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.154.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.61-52.154.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.154.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x"
},
"product_reference": "kernel-default-base-3.12.61-52.154.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.154.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.61-52.154.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.154.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.61-52.154.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.61-52.154.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x"
},
"product_reference": "kernel-default-man-3.12.61-52.154.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.154.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.154.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.154.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.154.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.154.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.154.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.154.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.61-52.154.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.154.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x"
},
"product_reference": "kernel-syms-3.12.61-52.154.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.154.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.154.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-17972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17972"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17972",
"url": "https://www.suse.com/security/cve/CVE-2018-17972"
},
{
"category": "external",
"summary": "SUSE Bug 1110785 for CVE-2018-17972",
"url": "https://bugzilla.suse.com/1110785"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-17972"
},
{
"cve": "CVE-2019-11190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11190"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11190",
"url": "https://www.suse.com/security/cve/CVE-2019-11190"
},
{
"category": "external",
"summary": "SUSE Bug 1131543 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1131543"
},
{
"category": "external",
"summary": "SUSE Bug 1132374 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132374"
},
{
"category": "external",
"summary": "SUSE Bug 1132472 for CVE-2019-11190",
"url": "https://bugzilla.suse.com/1132472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "important"
}
],
"title": "CVE-2019-11190"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-11884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11884"
}
],
"notes": [
{
"category": "general",
"text": "The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a \u0027\\0\u0027 character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11884",
"url": "https://www.suse.com/security/cve/CVE-2019-11884"
},
{
"category": "external",
"summary": "SUSE Bug 1134848 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1134848"
},
{
"category": "external",
"summary": "SUSE Bug 1139868 for CVE-2019-11884",
"url": "https://bugzilla.suse.com/1139868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "low"
}
],
"title": "CVE-2019-11884"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.154.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.154.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_154-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-24T19:01:10Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
suse-su-2019:1668-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.74-60_64_107 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bsc#1136446).\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1668,SUSE-SLE-SAP-12-SP1-2019-1650,SUSE-SLE-SAP-12-SP1-2019-1651,SUSE-SLE-SAP-12-SP1-2019-1652,SUSE-SLE-SAP-12-SP1-2019-1664,SUSE-SLE-SAP-12-SP1-2019-1668,SUSE-SLE-SERVER-12-2019-1665,SUSE-SLE-SERVER-12-2019-1667,SUSE-SLE-SERVER-12-2019-1680,SUSE-SLE-SERVER-12-2019-1681,SUSE-SLE-SERVER-12-SP1-2019-1650,SUSE-SLE-SERVER-12-SP1-2019-1651,SUSE-SLE-SERVER-12-SP1-2019-1652,SUSE-SLE-SERVER-12-SP1-2019-1664,SUSE-SLE-SERVER-12-SP1-2019-1668",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1668-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1668-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191668-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1668-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)",
"tracking": {
"current_release_date": "2019-06-21T16:10:20Z",
"generator": {
"date": "2019-06-21T16:10:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1668-1",
"initial_release_date": "2019-06-21T16:10:20Z",
"revision_history": [
{
"date": "2019-06-21T16:10:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:10:20Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:10:20Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:10:20Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_141-xen-9-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_146-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_149-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_104-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-default-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_107-xen-7-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-11-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-default-9-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_99-xen-9-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-21T16:10:20Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
suse-su-2019:2821-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108).\n- CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2821,SUSE-SLE-SAP-12-SP1-2019-2821,SUSE-SLE-SERVER-12-SP1-2019-2821",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2821-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2821-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2821-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html"
},
{
"category": "self",
"summary": "SUSE Bug 1102682",
"url": "https://bugzilla.suse.com/1102682"
},
{
"category": "self",
"summary": "SUSE Bug 1103203",
"url": "https://bugzilla.suse.com/1103203"
},
{
"category": "self",
"summary": "SUSE Bug 1133191",
"url": "https://bugzilla.suse.com/1133191"
},
{
"category": "self",
"summary": "SUSE Bug 1136446",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "self",
"summary": "SUSE Bug 1137597",
"url": "https://bugzilla.suse.com/1137597"
},
{
"category": "self",
"summary": "SUSE Bug 1140747",
"url": "https://bugzilla.suse.com/1140747"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1151021",
"url": "https://bugzilla.suse.com/1151021"
},
{
"category": "self",
"summary": "SUSE Bug 1153108",
"url": "https://bugzilla.suse.com/1153108"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153161",
"url": "https://bugzilla.suse.com/1153161"
},
{
"category": "self",
"summary": "SUSE Bug 904970",
"url": "https://bugzilla.suse.com/904970"
},
{
"category": "self",
"summary": "SUSE Bug 907150",
"url": "https://bugzilla.suse.com/907150"
},
{
"category": "self",
"summary": "SUSE Bug 920615",
"url": "https://bugzilla.suse.com/920615"
},
{
"category": "self",
"summary": "SUSE Bug 920633",
"url": "https://bugzilla.suse.com/920633"
},
{
"category": "self",
"summary": "SUSE Bug 930408",
"url": "https://bugzilla.suse.com/930408"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5390 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)",
"tracking": {
"current_release_date": "2019-10-30T10:32:41Z",
"generator": {
"date": "2019-10-30T10:32:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2821-1",
"initial_release_date": "2019-10-30T10:32:41Z",
"revision_history": [
{
"date": "2019-10-30T10:32:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5390"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5390",
"url": "https://www.suse.com/security/cve/CVE-2018-5390"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1102340 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1102340"
},
{
"category": "external",
"summary": "SUSE Bug 1102682 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1102682"
},
{
"category": "external",
"summary": "SUSE Bug 1103097 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1103097"
},
{
"category": "external",
"summary": "SUSE Bug 1103098 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1103098"
},
{
"category": "external",
"summary": "SUSE Bug 1156434 for CVE-2018-5390",
"url": "https://bugzilla.suse.com/1156434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2018-5390"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-30T10:32:41Z",
"details": "important"
}
],
"title": "CVE-2019-3846"
}
]
}
var-201906-1175
Vulnerability from variot
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. Linux Kernel Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state. A successful exploit could cause the targeted system to crash, resulting in a DoS condition. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. Kernel.org has confirmed the vulnerability and released software updates. ========================================================================== Kernel Live Patch Security Notice 0052-1 June 18, 2019
linux vulnerability
A security issue affects these releases of Ubuntu:
| Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency |
Summary:
Several security issues were fixed in the kernel. (CVE-2019-11478)
Update instructions:
The problem can be corrected by updating your livepatches to the following versions:
| Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 52.3 | generic, lowlatency | | 4.4.0-150.176 | 52.3 | generic, lowlatency | | 4.15.0-50.54 | 52.3 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 52.3 | generic, lowlatency | | 4.15.0-51.55 | 52.3 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 52.3 | generic, lowlatency |
References: CVE-2019-11477, CVE-2019-11478
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2019:1481-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1481 Issue date: 2019-06-17 CVE Names: CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)
-
Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)
-
Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service 1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service 1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-957.21.3.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm kernel-doc-3.10.0-957.21.3.el7.noarch.rpm
x86_64: bpftool-3.10.0-957.21.3.el7.x86_64.rpm kernel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-headers-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm perf-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-957.21.3.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm kernel-doc-3.10.0-957.21.3.el7.noarch.rpm
x86_64: bpftool-3.10.0-957.21.3.el7.x86_64.rpm kernel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-headers-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm perf-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-957.21.3.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm kernel-doc-3.10.0-957.21.3.el7.noarch.rpm
ppc64: kernel-3.10.0-957.21.3.el7.ppc64.rpm kernel-bootwrapper-3.10.0-957.21.3.el7.ppc64.rpm kernel-debug-3.10.0-957.21.3.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-debug-devel-3.10.0-957.21.3.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.21.3.el7.ppc64.rpm kernel-devel-3.10.0-957.21.3.el7.ppc64.rpm kernel-headers-3.10.0-957.21.3.el7.ppc64.rpm kernel-tools-3.10.0-957.21.3.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-tools-libs-3.10.0-957.21.3.el7.ppc64.rpm perf-3.10.0-957.21.3.el7.ppc64.rpm perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm python-perf-3.10.0-957.21.3.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm
ppc64le: kernel-3.10.0-957.21.3.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debug-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.21.3.el7.ppc64le.rpm kernel-devel-3.10.0-957.21.3.el7.ppc64le.rpm kernel-headers-3.10.0-957.21.3.el7.ppc64le.rpm kernel-tools-3.10.0-957.21.3.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.21.3.el7.ppc64le.rpm perf-3.10.0-957.21.3.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm python-perf-3.10.0-957.21.3.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm
s390x: kernel-3.10.0-957.21.3.el7.s390x.rpm kernel-debug-3.10.0-957.21.3.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.s390x.rpm kernel-debug-devel-3.10.0-957.21.3.el7.s390x.rpm kernel-debuginfo-3.10.0-957.21.3.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-957.21.3.el7.s390x.rpm kernel-devel-3.10.0-957.21.3.el7.s390x.rpm kernel-headers-3.10.0-957.21.3.el7.s390x.rpm kernel-kdump-3.10.0-957.21.3.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-957.21.3.el7.s390x.rpm kernel-kdump-devel-3.10.0-957.21.3.el7.s390x.rpm perf-3.10.0-957.21.3.el7.s390x.rpm perf-debuginfo-3.10.0-957.21.3.el7.s390x.rpm python-perf-3.10.0-957.21.3.el7.s390x.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.s390x.rpm
x86_64: bpftool-3.10.0-957.21.3.el7.x86_64.rpm kernel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-headers-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm perf-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: kernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-957.21.3.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.ppc64.rpm perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.21.3.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-957.21.3.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm kernel-doc-3.10.0-957.21.3.el7.noarch.rpm
x86_64: bpftool-3.10.0-957.21.3.el7.x86_64.rpm kernel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm kernel-headers-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm perf-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: kernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-11477 https://access.redhat.com/security/cve/CVE-2019-11478 https://access.redhat.com/security/cve/CVE-2019-11479 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/tcpsack
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXQfc5dzjgjWX9erEAQiHvA/9H8ok5idW5wQXIYe9k2vrUnDV0EilyBeN ybKZlww2bhuHKYwmUKD2WSbggNXvxOR0uzuLTEqM5R0od4ALa4SSxdNMTVO1ac8V 4nogSc7quxNGoYdhXyWPFqRTWIGMMV7mXRifTqGskcB1xB5JwMc2mGGvFA3xXGDu lxvNK70J+HjlTFf4wodaRCZdmyEQxYB8rOxQ42U+yFcbPmPqlyvLJV/6ULHU2utZ K/Ifmd5g9B0NbDR8hceVIdWFD6XIUbiyItn3Ubx0IHaBDVE9j+fo3FQ+ciPG73CD kl7nfHU0ebOrooxZQxFmbVltPUlVwyZQ6H/d1a31ZNdWDu/LQkG94bY7YARfDFLT xsJKMW+pQjAlFAbEVEBbesMXBwb6qdRgpugyr0o8cZbOYAEH2vkxbf1rcz1wAGgv dMRxnvUbgNML50jSuAh80vdzCjrkmhJxO2KSZXwEoLyDiiwfs4MILf20W+jn8tdG p6AGgFkENInQtAuAbcQHpjCmJPUNLoSKuzpQAry4RCNfklFElKhJxlHoxUPqvc42 SUN5BS7w8SF70ANWiW/V73+nYcDKJfV/3oMndJInVaCER6GF6NwpGQb7DjLM4krh gxhcCHeA0dHKVL8udjSrrEbdi4c3OmXz53p36Ww/Yh8k3BhVid7Wzt3HPBWFF5qs rjP0JW27B5U=rNYS -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Bug Fix(es):
-
kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)
-
7.5) - ppc64, ppc64le, x86_64
-
These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. # Advisory
ID: NFLX-2019-001
Title: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service vulnerabilities
Release Date: 2019-06-17
Severity: Critical
Overview:
Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels.
The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.
There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective. We recommend that affected parties enact one of those described below, based on their environment.
Fix: Apply the patch PATCH_net_1_4.patch. Additionally, versions of the Linux kernel up to, and including, 4.14 require a second patch PATCH_net_1a.patch.
Workaround #1: Block connections with a low MSS using one of the supplied filters. (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the net.ipv4.tcp_mtu_probing sysctl is set to 0, which appears to be the default value for that sysctl).
Workaround #2: Disable SACK processing (/proc/sys/net/ipv4/tcp_sack set to 0).
(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)
2: CVE-2019-11478: SACK Slowness (Linux < 4.15) or Excess Resource Usage (all Linux versions)
Description: It is possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. On Linux kernels prior to 4.15, an attacker may be able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
Fix: Apply the patch PATCH_net_2_4.patch
Workaround #1: Block connections with a low MSS using one of the supplied filters. (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the net.ipv4.tcp_mtu_probing sysctl is set to 0, which appears to be the default value for that sysctl).
Workaround #2: Disable SACK processing (/proc/sys/net/ipv4/tcp_sack set to 0).
(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)
3: CVE-2019-5599: SACK Slowness (FreeBSD 12 using the RACK TCP Stack)
Description: It is possible to send a crafted sequence of SACKs which will fragment the RACK send map. An attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection.
Workaround #1: Apply the patch split_limit.patch and set the net.inet.tcp.rack.split_limit sysctl to a reasonable value to limit the size of the SACK table.
Workaround #2: Temporarily disable the RACK TCP stack.
(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)
4: CVE-2019-11479: Excess Resource Consumption Due to Low MSS Values (all Linux versions)
Description: An attacker can force the Linux kernel to segment its responses into multiple TCP segments, each of which contains only 8 bytes of data. This drastically increases the bandwidth required to deliver the same amount of data. Further, it consumes additional resources (CPU and NIC processing power). This attack requires continued effort from the attacker and the impacts will end shortly after the attacker stops sending traffic.
Fix: Two patches PATCH_net_3_4.patch and PATCH_net_4_4.patch add a sysctl which enforces a minimum MSS, set by the net.ipv4.tcp_min_snd_mss sysctl. This lets an administrator enforce a minimum MSS appropriate for their applications.
Workaround: Block connections with a low MSS using one of the supplied filters. (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the net.ipv4.tcp_mtu_probing sysctl is set to 0, which appears to be the default value for that sysctl).
Note:
Good system and application coding and configuration practices (limiting write buffers to the necessary level, monitoring connection memory consumption via SO_MEMINFO, and aggressively closing misbehaving connections) can help to limit the impact of attacks against these kinds of vulnerabilities.
Acknowledgments:
Originally reported by Jonathan Looney.
We thank Eric Dumazet for providing Linux fixes and support.
We thank Bruce Curtis for providing the Linux filters.
We thank Jonathan Lemon and Alexey Kodanev for helping to improve the Linux patches.
We gratefully acknowledge the assistance of Tyler Hicks in testing fixes, refining the information about vulnerable versions, and providing assistance during the disclosure process.
Bug Fix(es):
-
MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713026)
-
[RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713029)
-
RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713044)
4
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201906-1175",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "2.6.29"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip link controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "19.04"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.5"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.14.127"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.15"
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"model": "big-ip global traffic manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "pulse policy secure",
"scope": "eq",
"trust": 1.0,
"vendor": "pulsesecure",
"version": null
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "18.04"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.10"
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.9.182"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "8.0"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip application security manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "4.20"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "5.1.11"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "enterprise linux aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip domain name system",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "big-ip webaccelerator",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.19.52"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "enterprise linux atomic host",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "enterprise mrg",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "2.0"
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip fraud protection service",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "4.4.182"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip policy enforcement manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "traffix signaling delivery controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "5.1.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.0.0"
},
{
"model": "traffix signaling delivery controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "5.0.0"
},
{
"model": "kernel",
"scope": "lt",
"trust": 1.0,
"vendor": "linux",
"version": "3.16.69"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip application acceleration manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip analytics",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "pulse secure virtual application delivery controller",
"scope": "eq",
"trust": 1.0,
"vendor": "pulsesecure",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "connect secure",
"scope": "eq",
"trust": 1.0,
"vendor": "ivanti",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.4"
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip edge gateway",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "16.04"
},
{
"model": "big-ip local traffic manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.4"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "enterprise linux aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "18.10"
},
{
"model": "big-ip access policy manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "kernel",
"scope": "gte",
"trust": 1.0,
"vendor": "linux",
"version": "3.17"
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.1"
},
{
"model": "big-ip advanced firewall manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip application security manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "big-ip link controller",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "pulse virtual application delivery controller",
"scope": null,
"trust": 0.8,
"vendor": "\u30d1\u30eb\u30b9\u30bb\u30ad\u30e5\u30a2",
"version": null
},
{
"model": "red hat virtualization",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "pulse connect secure",
"scope": null,
"trust": 0.8,
"vendor": "\u30d1\u30eb\u30b9\u30bb\u30ad\u30e5\u30a2",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "kernel",
"scope": null,
"trust": 0.8,
"vendor": "linux",
"version": null
},
{
"model": "big-ip webaccelerator",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "ubuntu",
"scope": null,
"trust": 0.8,
"vendor": "canonical",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "red hat enterprise linux",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "big-ip analytics",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "hitachi virtual storage platform",
"scope": null,
"trust": 0.8,
"vendor": "\u65e5\u7acb",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "red hat enterprise linux atomic host",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "big-ip domain name system",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "big-ip edge gateway",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "traffix sdc",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "pulse policy secure",
"scope": null,
"trust": 0.8,
"vendor": "\u30d1\u30eb\u30b9\u30bb\u30ad\u30e5\u30a2",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": "red hat enterprise mrg",
"scope": null,
"trust": 0.8,
"vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "153317"
},
{
"db": "PACKETSTORM",
"id": "153325"
},
{
"db": "PACKETSTORM",
"id": "153318"
},
{
"db": "PACKETSTORM",
"id": "153424"
},
{
"db": "PACKETSTORM",
"id": "153320"
}
],
"trust": 0.5
},
"cve": "CVE-2019-11477",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2019-11477",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-143127",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "security@ubuntu.com",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-11477",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2019-11477",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-11477",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "security@ubuntu.com",
"id": "CVE-2019-11477",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-11477",
"trust": 0.8,
"value": "High"
},
{
"author": "VULHUB",
"id": "VHN-143127",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-11477",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. Linux Kernel Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state. A successful exploit could cause the targeted system to crash, resulting in a DoS condition. \nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. \nKernel.org has confirmed the vulnerability and released software updates. ==========================================================================\nKernel Live Patch Security Notice 0052-1\nJune 18, 2019\n\nlinux vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu:\n\n| Series | Base kernel | Arch | flavors |\n|------------------+--------------+----------+------------------|\n| Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic |\n| Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency |\n| Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic |\n| Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency |\n\nSummary:\n\nSeveral security issues were fixed in the kernel. (CVE-2019-11478)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your livepatches to the following\nversions:\n\n| Kernel | Version | flavors |\n|--------------------------+----------+--------------------------|\n| 4.4.0-148.174 | 52.3 | generic, lowlatency |\n| 4.4.0-150.176 | 52.3 | generic, lowlatency |\n| 4.15.0-50.54 | 52.3 | generic, lowlatency |\n| 4.15.0-50.54~16.04.1 | 52.3 | generic, lowlatency |\n| 4.15.0-51.55 | 52.3 | generic, lowlatency |\n| 4.15.0-51.55~16.04.1 | 52.3 | generic, lowlatency |\n\nReferences:\n CVE-2019-11477, CVE-2019-11478\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security update\nAdvisory ID: RHSA-2019:1481-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:1481\nIssue date: 2019-06-17\nCVE Names: CVE-2019-11477 CVE-2019-11478 CVE-2019-11479\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. While processing SACK segments, the Linux kernel\u0027s socket buffer\n(SKB) data structure becomes fragmented. To efficiently process SACK blocks, the Linux\nkernel merges multiple fragmented SKBs into one, potentially overflowing\nthe variable holding the number of segments. A remote attacker could use\nthis flaw to crash the Linux kernel by sending a crafted sequence of SACK\nsegments on a TCP connection with small value of TCP MSS, resulting in a\ndenial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks\nallows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low\nMSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service\n1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service\n1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-957.21.3.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm\nkernel-doc-3.10.0-957.21.3.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm\nperf-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-957.21.3.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm\nkernel-doc-3.10.0-957.21.3.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm\nperf-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-957.21.3.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm\nkernel-doc-3.10.0-957.21.3.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debug-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-devel-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-headers-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-tools-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.ppc64.rpm\nperf-3.10.0-957.21.3.el7.ppc64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\npython-perf-3.10.0-957.21.3.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debug-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-devel-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-headers-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-tools-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.ppc64le.rpm\nperf-3.10.0-957.21.3.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\npython-perf-3.10.0-957.21.3.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-957.21.3.el7.s390x.rpm\nkernel-debug-3.10.0-957.21.3.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.s390x.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.s390x.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-957.21.3.el7.s390x.rpm\nkernel-devel-3.10.0-957.21.3.el7.s390x.rpm\nkernel-headers-3.10.0-957.21.3.el7.s390x.rpm\nkernel-kdump-3.10.0-957.21.3.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-957.21.3.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-957.21.3.el7.s390x.rpm\nperf-3.10.0-957.21.3.el7.s390x.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.s390x.rpm\npython-perf-3.10.0-957.21.3.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm\nperf-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.ppc64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-957.21.3.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm\nkernel-doc-3.10.0-957.21.3.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-devel-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm\nperf-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.21.3.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-11477\nhttps://access.redhat.com/security/cve/CVE-2019-11478\nhttps://access.redhat.com/security/cve/CVE-2019-11479\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/tcpsack\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nrjP0JW27B5U=rNYS\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)\n\n4. 7.5) - ppc64, ppc64le, x86_64\n\n3. These packages include redhat-release-virtualization-host,\novirt-node, and rhev-hypervisor. RHVH features a Cockpit user\ninterface for monitoring the host\u0027s resources and performing administrative\ntasks. # Advisory\n###### ID: NFLX-2019-001\n\n###### Title: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service vulnerabilities\n\n###### Release Date: 2019-06-17\n\n###### Severity: Critical\n\n### Overview:\n\nNetflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. \n\nThe vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _\u201cSACK Panic_,\u201d allows a remotely-triggered kernel panic on recent Linux kernels. \n\nThere are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective. We recommend that affected parties enact one of those described below, based on their environment. \n\n__Fix:__ Apply the patch [PATCH_net_1_4.patch](2019-001/PATCH_net_1_4.patch). Additionally, versions of the Linux kernel up to, and including, 4.14 require a second patch [PATCH_net_1a.patch](2019-001/PATCH_net_1a.patch). \n\n__Workaround #1:__ Block connections with a low MSS using one of the supplied [filters](2019-001/block-low-mss/README.md). (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the `net.ipv4.tcp_mtu_probing` sysctl is set to 0, which appears to be the default value for that sysctl). \n\n__Workaround #2:__ Disable SACK processing (`/proc/sys/net/ipv4/tcp_sack` set to 0). \n\n(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)\n\n\n### 2: [CVE-2019-11478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478): SACK Slowness (Linux \u003c 4.15) or Excess Resource Usage (all Linux versions)\n\n__Description:__ It is possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. On Linux kernels prior to 4.15, an attacker may be able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. \n\n__Fix:__ Apply the patch [PATCH_net_2_4.patch](2019-001/PATCH_net_2_4.patch)\n\n__Workaround #1:__ Block connections with a low MSS using one of the supplied [filters](2019-001/block-low-mss/README.md). (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the `net.ipv4.tcp_mtu_probing` sysctl is set to 0, which appears to be the default value for that sysctl). \n\n__Workaround #2:__ Disable SACK processing (`/proc/sys/net/ipv4/tcp_sack` set to 0). \n\n(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)\n\n\n### 3: [CVE-2019-5599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5599): SACK Slowness (FreeBSD 12 using the RACK TCP Stack)\n\n__Description:__ It is possible to send a crafted sequence of SACKs which will fragment the RACK send map. An attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. \n\n__Workaround #1:__ Apply the patch [split_limit.patch](2019-001/split_limit.patch) and set the `net.inet.tcp.rack.split_limit` sysctl to a reasonable value to limit the size of the SACK table. \n\n__Workaround #2:__ Temporarily disable the RACK TCP stack. \n\n(Note that either workaround should be sufficient on its own. It is not necessary to apply both workarounds.)\n\n\n### 4: [CVE-2019-11479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479): Excess Resource Consumption Due to Low MSS Values (all Linux versions)\n\n__Description:__ An attacker can force the Linux kernel to segment its responses into multiple TCP segments, each of which contains only 8 bytes of data. This drastically increases the bandwidth required to deliver the same amount of data. Further, it consumes additional resources (CPU and NIC processing power). This attack requires continued effort from the attacker and the impacts will end shortly after the attacker stops sending traffic. \n\n__Fix:__ Two patches [PATCH_net_3_4.patch](2019-001/PATCH_net_3_4.patch) and [PATCH_net_4_4.patch](2019-001/PATCH_net_4_4.patch) add a sysctl which enforces a minimum MSS, set by the `net.ipv4.tcp_min_snd_mss` sysctl. This lets an administrator enforce a minimum MSS appropriate for their applications. \n\n__Workaround:__ Block connections with a low MSS using one of the supplied [filters](2019-001/block-low-mss/README.md). (The values in the filters are examples. You can apply a higher or lower limit, as appropriate for your environment.) Note that these filters may break legitimate connections which rely on a low MSS. Also, note that this mitigation is only effective if TCP probing is disabled (that is, the `net.ipv4.tcp_mtu_probing` sysctl is set to 0, which appears to be the default value for that sysctl). \n\n\n### Note:\nGood system and application coding and configuration practices (limiting write buffers to the necessary level, monitoring connection memory consumption via SO_MEMINFO, and aggressively closing misbehaving connections) can help to limit the impact of attacks against these kinds of vulnerabilities. \n\n\n## Acknowledgments:\nOriginally reported by Jonathan Looney. \n\nWe thank Eric Dumazet for providing Linux fixes and support. \n\nWe thank Bruce Curtis for providing the Linux filters. \n\nWe thank Jonathan Lemon and Alexey Kodanev for helping to improve the Linux patches. \n\nWe gratefully acknowledge the assistance of Tyler Hicks in testing fixes, refining the information about vulnerable versions, and providing assistance during the disclosure process. \n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713026)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713029)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713044)\n\n4",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-11477"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"db": "PACKETSTORM",
"id": "153346"
},
{
"db": "PACKETSTORM",
"id": "153317"
},
{
"db": "PACKETSTORM",
"id": "153325"
},
{
"db": "PACKETSTORM",
"id": "153318"
},
{
"db": "PACKETSTORM",
"id": "153424"
},
{
"db": "PACKETSTORM",
"id": "153329"
},
{
"db": "PACKETSTORM",
"id": "153320"
}
],
"trust": 2.43
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-143127",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-11477",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-19-253-03",
"trust": 1.9
},
{
"db": "CERT/CC",
"id": "VU#905115",
"trust": 1.9
},
{
"db": "PACKETSTORM",
"id": "153346",
"trust": 1.2
},
{
"db": "PACKETSTORM",
"id": "154951",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/10/29/3",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/10/24/1",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/07/06/4",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/07/06/3",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/06/28/2",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2019/06/20/3",
"trust": 1.1
},
{
"db": "PULSESECURE",
"id": "SA44193",
"trust": 1.1
},
{
"db": "SIEMENS",
"id": "SSA-462066",
"trust": 1.1
},
{
"db": "MCAFEE",
"id": "SB10287",
"trust": 1.1
},
{
"db": "ICS CERT",
"id": "ICSA-23-234-01",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU96001661",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU93800789",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619",
"trust": 0.8
},
{
"db": "PACKETSTORM",
"id": "153424",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153329",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153320",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153317",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153318",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153325",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "153324",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153316",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153327",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153321",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153315",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153430",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153323",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153322",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "153328",
"trust": 0.1
},
{
"db": "CNNVD",
"id": "CNNVD-201906-681",
"trust": 0.1
},
{
"db": "BID",
"id": "108801",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-143127",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2019-11477",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "PACKETSTORM",
"id": "153346"
},
{
"db": "PACKETSTORM",
"id": "153317"
},
{
"db": "PACKETSTORM",
"id": "153325"
},
{
"db": "PACKETSTORM",
"id": "153318"
},
{
"db": "PACKETSTORM",
"id": "153424"
},
{
"db": "PACKETSTORM",
"id": "153329"
},
{
"db": "PACKETSTORM",
"id": "153320"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"id": "VAR-201906-1175",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
}
],
"trust": 0.46458334
},
"last_update_date": "2024-11-29T22:25:11.853000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "hitachi-sec-2020-303 Hitachi Storage Solution Security Information",
"trust": 0.8,
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"title": "Red Hat: Important: redhat-virtualization-host security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191594 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191485 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191484 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191480 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-lts-trusty, linux-lts-xenial vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4017-2"
},
{
"title": "Red Hat: Important: kernel-rt security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191487 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4017-1"
},
{
"title": "Red Hat: Important: kernel security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191482 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel-rt security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191486 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191481 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191488 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191490 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191479 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security and bug fix update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191489 - Security Advisory"
},
{
"title": "Red Hat: Important: redhat-virtualization-host security and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191699 - Security Advisory"
},
{
"title": "Red Hat: Important: kernel security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191483 - Security Advisory"
},
{
"title": "Arch Linux Issues: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2019-11477"
},
{
"title": "Amazon Linux AMI: ALAS-2019-1222",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1222"
},
{
"title": "Arch Linux Advisories: [ASA-201906-12] linux-hardened: denial of service",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201906-12"
},
{
"title": "Amazon Linux 2: ALAS2-2019-1222",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1222"
},
{
"title": "Arch Linux Advisories: [ASA-201906-15] linux-zen: denial of service",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201906-15"
},
{
"title": "Arch Linux Advisories: [ASA-201906-14] linux-lts: denial of service",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201906-14"
},
{
"title": "Arch Linux Advisories: [ASA-201906-13] linux: denial of service",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201906-13"
},
{
"title": "IBM: Security Bulletin: Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models 840 and 900",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=b0e404260719b6ae04a48fa01fe4ff1d"
},
{
"title": "IBM: Security Bulletin: Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models V840 and V9000",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=17e4e6718a6d3a42ddb3642e1aa88aaf"
},
{
"title": "Huawei Security Advisories: Security Advisory - Integer Overflow Vulnerability in the Linux Kernel (SACK Panic)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=a0ea5bac8e90e20896758ffe948339eb"
},
{
"title": "IBM: IBM Security Bulletin: IBM MQ Appliance is affected by kernel vulnerabilities (CVE-2019-11479, CVE-2019-11478 and CVE-2019-11477)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=3abb37d34c3aab5be030484842a197cf"
},
{
"title": "IBM: IBM Security Bulletin: Linux Kernel as used by IBM QRadar SIEM is vulnerable to Denial of Service(CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=ac66c3446fcbed558afc45a4f11875b9"
},
{
"title": "IBM: IBM Security Bulletin: Linux Kernel as used in IBM QRadar Network Packet Capture is vulnerable to denial of service (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=d4c7bbb6295709432116ceed6c8665d0"
},
{
"title": "IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilities (CVE-2019-11479, CVE-2019-11478, CVE-2019-11477)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bae5fea992c13f587f4c457e2320189d"
},
{
"title": "IBM: IBM Security Bulletin: IBM Cloud Kubernetes Service is affected by Linux Kernel security vulnerabilities (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c19eb1501fe75f4801786c3ecf1bdfcd"
},
{
"title": "IBM: IBM Security Bulletin: Vulnerabilities in kernel affect Power Hardware Management Console (CVE-2019-11479,CVE-2019-11477 and CVE-2019-11478)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=1eb240b9222a3f8a10e0a63fa47e7f24"
},
{
"title": "IBM: IBM Security Bulletin: IBM Security QRadar Packet Capture is vulnerable to Denial of Service (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-3896)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=1282c74cfb8f7d86371051c0a3c9e604"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=b013e0ae6345849ef39c81d52c9d45cf"
},
{
"title": "Citrix Security Bulletins: Citrix SD-WAN Security Update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=fa8566afabfba193549f3f15c0c81ff5"
},
{
"title": "Debian CVElist Bug Report Logs: linux-image-4.19.0-4-amd64: CVE-2019-11815",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=877a1ae1b4d7402bac3b3a0c44e3253b"
},
{
"title": "IBM: Security Bulletin: Vulnerabilities have been identified in OpenSSL and the Kernel shipped with the DS8000 Hardware Management Console (HMC)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=423d1da688755122eb2591196e4cc160"
},
{
"title": "Debian Security Advisories: DSA-4465-1 linux -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=1a396329c4647adcc53e47cd56d6ddad"
},
{
"title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2019",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=767e8ff3a913d6c9b177c63c24420933"
},
{
"title": "Fortinet Security Advisories: TCP SACK panic attack- Linux Kernel Vulnerabilities- CVE-2019-11477, CVE-2019-11478 \u0026 CVE-2019-11479",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories\u0026qid=FG-IR-19-180"
},
{
"title": "IBM: IBM Security Bulletin: IBM Netezza Host Management is affected by the vulnerabilities known as Intel Microarchitectural Data Sampling (MDS) and other Kernel vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=9b0697bf711f12539432f3ec83b074bf"
},
{
"title": "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (February 2020v2)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=d9474066c07efdb84c4612586270078f"
},
{
"title": "IBM: IBM Security Bulletin: Linux Kernel vulnerabilities affect IBM Spectrum Protect Plus CVE-2019-10140, CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-13233, CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-15090, CVE-2019-15807, CVE-2019-15925",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=d9cd8f6d11c68af77f2f2bd27ca37bed"
},
{
"title": "IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been addressed in IBM Security Access Manager Appliance",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=800337bc69aa7ad92ac88a2adcc7d426"
},
{
"title": "Palo Alto Networks Security Advisory: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory\u0026qid=e4153a9b76a5eea42e73bc20e968375b"
},
{
"title": "Palo Alto Networks Security Advisory: PAN-SA-2019-0013 Information about TCP SACK Panic Findings in PAN-OS",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory\u0026qid=57ed3d9f467472d630cb7b7dfca89570"
},
{
"title": "IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches \u00e2\u20ac\u201c Release 1801-za",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=8710e4e233940f7482a6adad4643a7a8"
},
{
"title": "IBM: IBM Security Bulletin: IBM Security Privileged Identity Manager is affected by multiple security vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=8580d3cd770371e2ef0f68ca624b80b0"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d"
},
{
"title": "linux_hardening_arsenal",
"trust": 0.1,
"url": "https://github.com/lucassbeiler/linux_hardening_arsenal "
},
{
"title": "tcp_sack_fix",
"trust": 0.1,
"url": "https://github.com/sonoransun/tcp_sack_fix "
},
{
"title": "kpatch-sack-panic",
"trust": 0.1,
"url": "https://github.com/fengjian/kpatch-sack-panic "
},
{
"title": "FFFFM",
"trust": 0.1,
"url": "https://github.com/misanthropos/FFFFM "
},
{
"title": "docLinux",
"trust": 0.1,
"url": "https://github.com/hightemp/docLinux "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-190",
"trust": 1.1
},
{
"problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"trust": 1.9,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"trust": 1.5,
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"trust": 1.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-11477"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2019:1594"
},
{
"trust": 1.1,
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"trust": 1.1,
"url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2020-010.txt"
},
{
"trust": 1.1,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"trust": 1.1,
"url": "http://www.vmware.com/security/advisories/vmsa-2019-0010.html"
},
{
"trust": 1.1,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"trust": 1.1,
"url": "https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44193"
},
{
"trust": 1.1,
"url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0006"
},
{
"trust": 1.1,
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"trust": 1.1,
"url": "https://support.f5.com/csp/article/k78234183"
},
{
"trust": 1.1,
"url": "https://www.synology.com/security/advisory/synology_sa_19_28"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/153346/kernel-live-patch-security-notice-lsn-0052-1.html"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html"
},
{
"trust": 1.1,
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"trust": 1.1,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/sackpanic"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1602"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1699"
},
{
"trust": 1.0,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10287"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93800789/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu96001661/index.html"
},
{
"trust": 0.8,
"url": "https://www.kb.cert.org/vuls/id/905115/"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-234-01"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-11478"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-11479"
},
{
"trust": 0.5,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2019-11479"
},
{
"trust": 0.5,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2019-11477"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2019-11478"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.1,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10287"
},
{
"trust": 0.1,
"url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1481"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-9213"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1480"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-9213"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1482"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/articles/2974891"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5599"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11479):"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11478):"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5599):"
},
{
"trust": 0.1,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11477):"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-3896"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3896"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1489"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "PACKETSTORM",
"id": "153346"
},
{
"db": "PACKETSTORM",
"id": "153317"
},
{
"db": "PACKETSTORM",
"id": "153325"
},
{
"db": "PACKETSTORM",
"id": "153318"
},
{
"db": "PACKETSTORM",
"id": "153424"
},
{
"db": "PACKETSTORM",
"id": "153329"
},
{
"db": "PACKETSTORM",
"id": "153320"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-143127"
},
{
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"db": "PACKETSTORM",
"id": "153346"
},
{
"db": "PACKETSTORM",
"id": "153317"
},
{
"db": "PACKETSTORM",
"id": "153325"
},
{
"db": "PACKETSTORM",
"id": "153318"
},
{
"db": "PACKETSTORM",
"id": "153424"
},
{
"db": "PACKETSTORM",
"id": "153329"
},
{
"db": "PACKETSTORM",
"id": "153320"
},
{
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-143127"
},
{
"date": "2019-06-19T00:00:00",
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"date": "2019-06-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"date": "2019-06-19T17:20:41",
"db": "PACKETSTORM",
"id": "153346"
},
{
"date": "2019-06-17T19:16:14",
"db": "PACKETSTORM",
"id": "153317"
},
{
"date": "2019-06-18T15:43:55",
"db": "PACKETSTORM",
"id": "153325"
},
{
"date": "2019-06-17T19:16:21",
"db": "PACKETSTORM",
"id": "153318"
},
{
"date": "2019-06-25T23:49:17",
"db": "PACKETSTORM",
"id": "153424"
},
{
"date": "2019-06-18T15:50:02",
"db": "PACKETSTORM",
"id": "153329"
},
{
"date": "2019-06-18T15:43:09",
"db": "PACKETSTORM",
"id": "153320"
},
{
"date": "2019-06-19T00:15:12.640000",
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-01-17T00:00:00",
"db": "VULHUB",
"id": "VHN-143127"
},
{
"date": "2023-08-16T00:00:00",
"db": "VULMON",
"id": "CVE-2019-11477"
},
{
"date": "2023-08-24T05:29:00",
"db": "JVNDB",
"id": "JVNDB-2019-005619"
},
{
"date": "2024-11-21T04:21:09.480000",
"db": "NVD",
"id": "CVE-2019-11477"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "153346"
}
],
"trust": 0.1
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Linux\u00a0Kernel\u00a0 Integer overflow vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-005619"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "overflow",
"sources": [
{
"db": "PACKETSTORM",
"id": "153346"
}
],
"trust": 0.1
}
}
ICSA-19-253-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting theses vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could cause denial-of-service condition.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "CISAservicedesk@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-19-253-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-253-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-253-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-253-03"
}
],
"title": "ICSA-19-253-03_Siemens Industrial Products (Update P)",
"tracking": {
"current_release_date": "2022-05-12T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA USCert CSAF Generator",
"version": "1"
}
},
"id": "ICSA-19-253-03",
"initial_release_date": "2019-09-10T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-09-10T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-19-253-03 Siemens Industrial Products"
},
{
"date": "2019-10-08T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update A)"
},
{
"date": "2019-11-14T00:00:00.000000Z",
"legacy_version": "B",
"number": "3",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update B)"
},
{
"date": "2019-12-10T00:00:00.000000Z",
"legacy_version": "C",
"number": "4",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update C)"
},
{
"date": "2020-02-11T00:00:00.000000Z",
"legacy_version": "D",
"number": "5",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update D)"
},
{
"date": "2020-03-10T00:00:00.000000Z",
"legacy_version": "E",
"number": "6",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update E)"
},
{
"date": "2020-04-14T00:00:00.000000Z",
"legacy_version": "F",
"number": "7",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update F)"
},
{
"date": "2020-06-09T00:00:00.000000Z",
"legacy_version": "G",
"number": "8",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update G)"
},
{
"date": "2020-08-11T00:00:00.000000Z",
"legacy_version": "H",
"number": "9",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update H)"
},
{
"date": "2020-09-08T00:00:00.000000Z",
"legacy_version": "I",
"number": "10",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update I)"
},
{
"date": "2020-10-13T00:00:00.000000Z",
"legacy_version": "J",
"number": "11",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update J)"
},
{
"date": "2020-12-08T00:00:00.000000Z",
"legacy_version": "K",
"number": "12",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update K)"
},
{
"date": "2021-04-13T00:00:00.000000Z",
"legacy_version": "L",
"number": "13",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update L)"
},
{
"date": "2021-05-11T00:00:00.000000Z",
"legacy_version": "M",
"number": "14",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update M)"
},
{
"date": "2021-07-13T00:00:00.000000Z",
"legacy_version": "N",
"number": "15",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update N)"
},
{
"date": "2021-09-14T00:00:00.000000Z",
"legacy_version": "O",
"number": "16",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update O)"
},
{
"date": "2022-03-10T00:00:00.000000Z",
"legacy_version": "P",
"number": "17",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update P)"
},
{
"date": "2022-04-14T00:00:00.000000Z",
"legacy_version": "Q",
"number": "18",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update Q)"
},
{
"date": "2022-05-12T00:00:00.000000Z",
"legacy_version": "R",
"number": "19",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update R)"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC2200 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC2200 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF188C: All versions prior to v1.3",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC RF188C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.8.4",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB- 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant): All versions prior to v2.8.4",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB- 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.5.18",
"product": {
"name": "SIMATIC CP 442-1 RNA (6GK7442-1RX00-0XE0): All versions prior to v1.5.18",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 442-1 RNA (6GK7442-1RX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2): All versions prior to v6.2",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1900: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF186C: All versions prior to v1.3",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "SIMATIC RF186C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.8.4",
"product": {
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0): All versions prior to v2.8.4",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "RUGGEDCOM RM1224 (6GK6108-4AM00): All versions prior to v6.2",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 (6GK6108-4AM00)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00019"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 4R-IE (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00020"
}
}
],
"category": "product_name",
"name": "TIM 4R-IE (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00021"
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2): All versions prior to v6.2",
"product_id": "CSAFPID-00022"
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S623: All versions prior to v4.1",
"product_id": "CSAFPID-00023"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00024"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.5.18",
"product": {
"name": "SIMATIC CP 443-1 RNA (6GK7443-1RX00-0XE0): All versions prior to v1.5.18",
"product_id": "CSAFPID-00025"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 RNA (6GK7443-1RX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 8.6.0",
"product": {
"name": "SCALANCE W1750D: All versions prior to v8.6.0",
"product_id": "CSAFPID-00026"
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants): All versions prior to v2.1",
"product_id": "CSAFPID-00027"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00028"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.13.3",
"product": {
"name": "ROX II: All versions prior to 2.13.3",
"product_id": "CSAFPID-00029"
}
}
],
"category": "product_name",
"name": "ROX II"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S612: All versions prior to v4.1",
"product_id": "CSAFPID-00030"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE M875: All versions",
"product_id": "CSAFPID-00031"
}
}
],
"category": "product_name",
"name": "SCALANCE M875"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00032"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.92",
"product": {
"name": "SINUMERIK 808D: All versions prior to v4.92",
"product_id": "CSAFPID-00033"
}
}
],
"category": "product_name",
"name": "SINUMERIK 808D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10): All versions prior to v2.1",
"product_id": "CSAFPID-00034"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00035"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00036"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13 | 13 (only affected by CVE-2019-11479)",
"product": {
"name": "RUGGEDCOM RX 1400 VPE Linux CloudConnect: All versions prior to Debian 9 Linux Image 2019-12-13 13 (only affected by CVE-2019-11479)",
"product_id": "CSAFPID-00037"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RX 1400 VPE Linux CloudConnect"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC2200: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00038"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC2200"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 343-1 Advanced (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00039"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 343-1 Advanced (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00040"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00041"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.1.5",
"product": {
"name": "CloudConnect 712: All versions prior to 1.1.5",
"product_id": "CSAFPID-00042"
}
}
],
"category": "product_name",
"name": "CloudConnect 712"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00043"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF186CI: All versions prior to v1.3",
"product_id": "CSAFPID-00044"
}
}
],
"category": "product_name",
"name": "SIMATIC RF186CI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "TIM 1531 IRC (incl. SIPLUS NET variants): All versions prior to 2.1",
"product_id": "CSAFPID-00045"
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10): All versions prior to v2.1",
"product_id": "CSAFPID-00046"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1242-7C: All versions prior to v3.2",
"product_id": "CSAFPID-00047"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1242-7C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00048"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00049"
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00050"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 17.0",
"product": {
"name": "SIMATIC CP 1628 (6GK1162-8AA00): All versions prior to v17.0",
"product_id": "CSAFPID-00051"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1628 (6GK1162-8AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0): All versions prior to v3.2",
"product_id": "CSAFPID-00052"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00053"
}
}
],
"category": "product_name",
"name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1900 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00054"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1900 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1500 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00055"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1500 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00056"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1500: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00057"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00058"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00059"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.0",
"product": {
"name": "SIMATIC CM 1542-1: All versions prior to 3.0",
"product_id": "CSAFPID-00060"
}
}
],
"category": "product_name",
"name": "SIMATIC CM 1542-1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00061"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10): All versions prior to v2.1",
"product_id": "CSAFPID-00062"
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00063"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00064"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10): All versions prior to v2.1",
"product_id": "CSAFPID-00065"
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.2",
"product": {
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0): All versions prior to v2.2",
"product_id": "CSAFPID-00066"
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00067"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Teleservice Adapter IE Advanced: All versions",
"product_id": "CSAFPID-00068"
}
}
],
"category": "product_name",
"name": "SIMATIC Teleservice Adapter IE Advanced"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S602: All versions prior to v4.1",
"product_id": "CSAFPID-00069"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0): All versions",
"product_id": "CSAFPID-00070"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 Advanced (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00071"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 Advanced (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF188CI: All versions prior to v1.3",
"product_id": "CSAFPID-00072"
}
}
],
"category": "product_name",
"name": "SIMATIC RF188CI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S627-2M: All versions prior to v4.1",
"product_id": "CSAFPID-00073"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2): All versions prior to v6.2",
"product_id": "CSAFPID-00074"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE WLC711: All versions",
"product_id": "CSAFPID-00075"
}
}
],
"category": "product_name",
"name": "SCALANCE WLC711"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE Advanced (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00076"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE Advanced (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10): All versions prior to v2.1",
"product_id": "CSAFPID-00077"
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00078"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SINEMA Remote Connect Server: All versions prior to v2.1",
"product_id": "CSAFPID-00079"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE WLC712: All versions",
"product_id": "CSAFPID-00080"
}
}
],
"category": "product_name",
"name": "SCALANCE WLC712"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13",
"product": {
"name": "RUGGEDCOM RX 1400 VPE Debian Linux: All versions prior to Debian 9 Linux Image 2019-12-13",
"product_id": "CSAFPID-00081"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RX 1400 VPE Debian Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00082"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Teleservice Adapter IE Basic: All versions",
"product_id": "CSAFPID-00083"
}
}
],
"category": "product_name",
"name": "SIMATIC Teleservice Adapter IE Basic"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00084"
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00085"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00086"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2): All versions prior to v6.2",
"product_id": "CSAFPID-00087"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00088"
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1623 (6GK1162-3AA00): All versions prior to v14.00.15.00_51.25.00.01",
"product_id": "CSAFPID-00089"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1623 (6GK1162-3AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00090"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.8 | SP5",
"product": {
"name": "SINUMERIK 828D: All versions prior to v4.8 SP5",
"product_id": "CSAFPID-00091"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00092"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13",
"product": {
"name": "RUGGEDCOM APE 1404 Linux: All versions prior to Debian 9 Linux Image 2019-12-13",
"product_id": "CSAFPID-00093"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE 1404 Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00094"
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.8 SP5",
"product": {
"name": "SINUMERIK 840D sl: All versions prior to v4.8 SP5",
"product_id": "CSAFPID-00095"
}
}
],
"category": "product_name",
"name": "SINUMERIK 840D sl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10): All versions prior to v2.1",
"product_id": "CSAFPID-00096"
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.2",
"product": {
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0): All versions prior to v2.2",
"product_id": "CSAFPID-00097"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00098"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00099"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2): All versions prior to v6.2",
"product_id": "CSAFPID-000100"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-000101"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF185C: All versions prior to v1.3",
"product_id": "CSAFPID-000102"
}
}
],
"category": "product_name",
"name": "SIMATIC RF185C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-000103"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-000104"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-000105"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.4",
"product": {
"name": "SCALANCE W-700 IEEE 802.11n family: All versions prior to v6.4",
"product_id": "CSAFPID-000106"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0",
"product": {
"name": "SCALANCE W-1700 IEEE 802.11ac family: All versions prior to v2.0",
"product_id": "CSAFPID-000107"
}
}
],
"category": "product_name",
"name": "SCALANCE W-1700 IEEE 802.11ac family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-8460",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The kernel can be forced to make very expensive calls for every incoming TCP Selective Acknowledgement (SACK) packet which can lead to a denial-of-service condition. CVE-2019-8460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-8460"
},
{
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The kernel is affected by an integer overflow when handling TCP Selective Acknowledgements, which could allow a remote attacker to cause a denial-of-service condition. CVE-2019-11477 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A remote attacker sending specially crafted TCP Selective Acknowledgment (SACK) sequences may cause a denial-of-service condition. CVE-2019-11478 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An attacker may exploit a vulnerability in the TCP retransmission queue implementation kernel when handling TCP Selective Acknowledgements (SACK) to cause a denial-of-service condition. CVE-2019-11479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11479"
}
]
}
icsa-19-253-03
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens",
"summary": "reporting theses vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could cause denial-of-service condition.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "CISAservicedesk@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-19-253-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-253-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-253-03 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-253-03"
}
],
"title": "ICSA-19-253-03_Siemens Industrial Products (Update P)",
"tracking": {
"current_release_date": "2022-05-12T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA USCert CSAF Generator",
"version": "1"
}
},
"id": "ICSA-19-253-03",
"initial_release_date": "2019-09-10T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-09-10T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-19-253-03 Siemens Industrial Products"
},
{
"date": "2019-10-08T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update A)"
},
{
"date": "2019-11-14T00:00:00.000000Z",
"legacy_version": "B",
"number": "3",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update B)"
},
{
"date": "2019-12-10T00:00:00.000000Z",
"legacy_version": "C",
"number": "4",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update C)"
},
{
"date": "2020-02-11T00:00:00.000000Z",
"legacy_version": "D",
"number": "5",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update D)"
},
{
"date": "2020-03-10T00:00:00.000000Z",
"legacy_version": "E",
"number": "6",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update E)"
},
{
"date": "2020-04-14T00:00:00.000000Z",
"legacy_version": "F",
"number": "7",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update F)"
},
{
"date": "2020-06-09T00:00:00.000000Z",
"legacy_version": "G",
"number": "8",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update G)"
},
{
"date": "2020-08-11T00:00:00.000000Z",
"legacy_version": "H",
"number": "9",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update H)"
},
{
"date": "2020-09-08T00:00:00.000000Z",
"legacy_version": "I",
"number": "10",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update I)"
},
{
"date": "2020-10-13T00:00:00.000000Z",
"legacy_version": "J",
"number": "11",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update J)"
},
{
"date": "2020-12-08T00:00:00.000000Z",
"legacy_version": "K",
"number": "12",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update K)"
},
{
"date": "2021-04-13T00:00:00.000000Z",
"legacy_version": "L",
"number": "13",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update L)"
},
{
"date": "2021-05-11T00:00:00.000000Z",
"legacy_version": "M",
"number": "14",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update M)"
},
{
"date": "2021-07-13T00:00:00.000000Z",
"legacy_version": "N",
"number": "15",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update N)"
},
{
"date": "2021-09-14T00:00:00.000000Z",
"legacy_version": "O",
"number": "16",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update O)"
},
{
"date": "2022-03-10T00:00:00.000000Z",
"legacy_version": "P",
"number": "17",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update P)"
},
{
"date": "2022-04-14T00:00:00.000000Z",
"legacy_version": "Q",
"number": "18",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update Q)"
},
{
"date": "2022-05-12T00:00:00.000000Z",
"legacy_version": "R",
"number": "19",
"summary": "ICSA-19-253-03 Siemens Industrial Products (Update R)"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC2200 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC2200 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF188C: All versions prior to v1.3",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC RF188C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.8.4",
"product": {
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB- 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant): All versions prior to v2.8.4",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB- 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.5.18",
"product": {
"name": "SIMATIC CP 442-1 RNA (6GK7442-1RX00-0XE0): All versions prior to v1.5.18",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 442-1 RNA (6GK7442-1RX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2): All versions prior to v6.2",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (6GK5876-3AA02-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00010"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1900: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00011"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00012"
}
}
],
"category": "product_name",
"name": "SCALANCE M804PB (6GK5804-0AP00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00013"
}
}
],
"category": "product_name",
"name": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF186C: All versions prior to v1.3",
"product_id": "CSAFPID-00014"
}
}
],
"category": "product_name",
"name": "SIMATIC RF186C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00015"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00016"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.8.4",
"product": {
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0): All versions prior to v2.8.4",
"product_id": "CSAFPID-00017"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "RUGGEDCOM RM1224 (6GK6108-4AM00): All versions prior to v6.2",
"product_id": "CSAFPID-00018"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RM1224 (6GK6108-4AM00)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00019"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 4R-IE (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00020"
}
}
],
"category": "product_name",
"name": "TIM 4R-IE (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00021"
}
}
],
"category": "product_name",
"name": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2): All versions prior to v6.2",
"product_id": "CSAFPID-00022"
}
}
],
"category": "product_name",
"name": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S623: All versions prior to v4.1",
"product_id": "CSAFPID-00023"
}
}
],
"category": "product_name",
"name": "SCALANCE S623"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00024"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.5.18",
"product": {
"name": "SIMATIC CP 443-1 RNA (6GK7443-1RX00-0XE0): All versions prior to v1.5.18",
"product_id": "CSAFPID-00025"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 RNA (6GK7443-1RX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 8.6.0",
"product": {
"name": "SCALANCE W1750D: All versions prior to v8.6.0",
"product_id": "CSAFPID-00026"
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants): All versions prior to v2.1",
"product_id": "CSAFPID-00027"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00028"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.13.3",
"product": {
"name": "ROX II: All versions prior to 2.13.3",
"product_id": "CSAFPID-00029"
}
}
],
"category": "product_name",
"name": "ROX II"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S612: All versions prior to v4.1",
"product_id": "CSAFPID-00030"
}
}
],
"category": "product_name",
"name": "SCALANCE S612"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE M875: All versions",
"product_id": "CSAFPID-00031"
}
}
],
"category": "product_name",
"name": "SCALANCE M875"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00032"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.92",
"product": {
"name": "SINUMERIK 808D: All versions prior to v4.92",
"product_id": "CSAFPID-00033"
}
}
],
"category": "product_name",
"name": "SINUMERIK 808D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10): All versions prior to v2.1",
"product_id": "CSAFPID-00034"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00035"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00036"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13 | 13 (only affected by CVE-2019-11479)",
"product": {
"name": "RUGGEDCOM RX 1400 VPE Linux CloudConnect: All versions prior to Debian 9 Linux Image 2019-12-13 13 (only affected by CVE-2019-11479)",
"product_id": "CSAFPID-00037"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RX 1400 VPE Linux CloudConnect"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC2200: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00038"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC2200"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 343-1 Advanced (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00039"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 343-1 Advanced (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00040"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00041"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.1.5",
"product": {
"name": "CloudConnect 712: All versions prior to 1.1.5",
"product_id": "CSAFPID-00042"
}
}
],
"category": "product_name",
"name": "CloudConnect 712"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00043"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF186CI: All versions prior to v1.3",
"product_id": "CSAFPID-00044"
}
}
],
"category": "product_name",
"name": "SIMATIC RF186CI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "TIM 1531 IRC (incl. SIPLUS NET variants): All versions prior to 2.1",
"product_id": "CSAFPID-00045"
}
}
],
"category": "product_name",
"name": "TIM 1531 IRC (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10): All versions prior to v2.1",
"product_id": "CSAFPID-00046"
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1242-7C: All versions prior to v3.2",
"product_id": "CSAFPID-00047"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1242-7C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00048"
}
}
],
"category": "product_name",
"name": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00049"
}
}
],
"category": "product_name",
"name": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00050"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 17.0",
"product": {
"name": "SIMATIC CP 1628 (6GK1162-8AA00): All versions prior to v17.0",
"product_id": "CSAFPID-00051"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1628 (6GK1162-8AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0): All versions prior to v3.2",
"product_id": "CSAFPID-00052"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00053"
}
}
],
"category": "product_name",
"name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1900 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00054"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1900 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1500 PRO: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00055"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1500 PRO"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00056"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.1.1.0",
"product": {
"name": "SIMATIC ITC1500: All versions prior to v3.1.1.0",
"product_id": "CSAFPID-00057"
}
}
],
"category": "product_name",
"name": "SIMATIC ITC1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00058"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00059"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.0",
"product": {
"name": "SIMATIC CM 1542-1: All versions prior to 3.0",
"product_id": "CSAFPID-00060"
}
}
],
"category": "product_name",
"name": "SIMATIC CM 1542-1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00061"
}
}
],
"category": "product_name",
"name": "SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10): All versions prior to v2.1",
"product_id": "CSAFPID-00062"
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00063"
}
}
],
"category": "product_name",
"name": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-00064"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10): All versions prior to v2.1",
"product_id": "CSAFPID-00065"
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.2",
"product": {
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0): All versions prior to v2.2",
"product_id": "CSAFPID-00066"
}
}
],
"category": "product_name",
"name": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00067"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Teleservice Adapter IE Advanced: All versions",
"product_id": "CSAFPID-00068"
}
}
],
"category": "product_name",
"name": "SIMATIC Teleservice Adapter IE Advanced"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S602: All versions prior to v4.1",
"product_id": "CSAFPID-00069"
}
}
],
"category": "product_name",
"name": "SCALANCE S602"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0): All versions",
"product_id": "CSAFPID-00070"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC CP 443-1 Advanced (incl. SIPLUS variants): All versions",
"product_id": "CSAFPID-00071"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 443-1 Advanced (incl. SIPLUS variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF188CI: All versions prior to v1.3",
"product_id": "CSAFPID-00072"
}
}
],
"category": "product_name",
"name": "SIMATIC RF188CI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.1",
"product": {
"name": "SCALANCE S627-2M: All versions prior to v4.1",
"product_id": "CSAFPID-00073"
}
}
],
"category": "product_name",
"name": "SCALANCE S627-2M"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2): All versions prior to v6.2",
"product_id": "CSAFPID-00074"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE WLC711: All versions",
"product_id": "CSAFPID-00075"
}
}
],
"category": "product_name",
"name": "SCALANCE WLC711"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "TIM 3V-IE Advanced (incl. SIPLUS NET variants): All versions",
"product_id": "CSAFPID-00076"
}
}
],
"category": "product_name",
"name": "TIM 3V-IE Advanced (incl. SIPLUS NET variants)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10): All versions prior to v2.1",
"product_id": "CSAFPID-00077"
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00078"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SINEMA Remote Connect Server: All versions prior to v2.1",
"product_id": "CSAFPID-00079"
}
}
],
"category": "product_name",
"name": "SINEMA Remote Connect Server"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SCALANCE WLC712: All versions",
"product_id": "CSAFPID-00080"
}
}
],
"category": "product_name",
"name": "SCALANCE WLC712"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13",
"product": {
"name": "RUGGEDCOM RX 1400 VPE Debian Linux: All versions prior to Debian 9 Linux Image 2019-12-13",
"product_id": "CSAFPID-00081"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RX 1400 VPE Debian Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00082"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-3 (6GK5874-3AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "SIMATIC Teleservice Adapter IE Basic: All versions",
"product_id": "CSAFPID-00083"
}
}
],
"category": "product_name",
"name": "SIMATIC Teleservice Adapter IE Basic"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00084"
}
}
],
"category": "product_name",
"name": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-00085"
}
}
],
"category": "product_name",
"name": "SCALANCE S615 (6GK5615-0AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00086"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2): All versions prior to v6.2",
"product_id": "CSAFPID-00087"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0.1",
"product": {
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2): All versions prior to v2.0.1",
"product_id": "CSAFPID-00088"
}
}
],
"category": "product_name",
"name": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 14.00.15.00_51.25.00.01",
"product": {
"name": "SIMATIC CP 1623 (6GK1162-3AA00): All versions prior to v14.00.15.00_51.25.00.01",
"product_id": "CSAFPID-00089"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1623 (6GK1162-3AA00)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00090"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.8 | SP5",
"product": {
"name": "SINUMERIK 828D: All versions prior to v4.8 SP5",
"product_id": "CSAFPID-00091"
}
}
],
"category": "product_name",
"name": "SINUMERIK 828D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00092"
}
}
],
"category": "product_name",
"name": "SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 9 Linux Image 2019-12-13",
"product": {
"name": "RUGGEDCOM APE 1404 Linux: All versions prior to Debian 9 Linux Image 2019-12-13",
"product_id": "CSAFPID-00093"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM APE 1404 Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0): All versions prior to v2.1",
"product_id": "CSAFPID-00094"
}
}
],
"category": "product_name",
"name": "SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.8 SP5",
"product": {
"name": "SINUMERIK 840D sl: All versions prior to v4.8 SP5",
"product_id": "CSAFPID-00095"
}
}
],
"category": "product_name",
"name": "SINUMERIK 840D sl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.1",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10): All versions prior to v2.1",
"product_id": "CSAFPID-00096"
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.2",
"product": {
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0): All versions prior to v2.2",
"product_id": "CSAFPID-00097"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00098"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-00099"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2): All versions prior to v6.2",
"product_id": "CSAFPID-000100"
}
}
],
"category": "product_name",
"name": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2",
"product": {
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0): All versions prior to v3.2",
"product_id": "CSAFPID-000101"
}
}
],
"category": "product_name",
"name": "SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 1.3",
"product": {
"name": "SIMATIC RF185C: All versions prior to v1.3",
"product_id": "CSAFPID-000102"
}
}
],
"category": "product_name",
"name": "SIMATIC RF185C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.2",
"product": {
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2): All versions prior to v6.2",
"product_id": "CSAFPID-000103"
}
}
],
"category": "product_name",
"name": "SCALANCE M874-2 (6GK5874-2AA00-2AA2)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0): All versions prior to v4.0",
"product_id": "CSAFPID-000104"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 4.0",
"product": {
"name": "SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0): All versions prior to v4.0",
"product_id": "CSAFPID-000105"
}
}
],
"category": "product_name",
"name": "SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 6.4",
"product": {
"name": "SCALANCE W-700 IEEE 802.11n family: All versions prior to v6.4",
"product_id": "CSAFPID-000106"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 2.0",
"product": {
"name": "SCALANCE W-1700 IEEE 802.11ac family: All versions prior to v2.0",
"product_id": "CSAFPID-000107"
}
}
],
"category": "product_name",
"name": "SCALANCE W-1700 IEEE 802.11ac family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-8460",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The kernel can be forced to make very expensive calls for every incoming TCP Selective Acknowledgement (SACK) packet which can lead to a denial-of-service condition. CVE-2019-8460 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-8460"
},
{
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "The kernel is affected by an integer overflow when handling TCP Selective Acknowledgements, which could allow a remote attacker to cause a denial-of-service condition. CVE-2019-11477 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A remote attacker sending specially crafted TCP Selective Acknowledgment (SACK) sequences may cause a denial-of-service condition. CVE-2019-11478 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An attacker may exploit a vulnerability in the TCP retransmission queue implementation kernel when handling TCP Selective Acknowledgements (SACK) to cause a denial-of-service condition. CVE-2019-11479 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
}
],
"remediations": [
{
"category": "mitigation",
"details": "The following products are discontinued as of October 1, 2019. Siemens recommends upgrading hardware to successor products from the SCALANCE SC-600 family and applying patches when available, or following the manual mitigations addressed below.SCALANCE S602: Update to v4.1 (Update is only available via Siemens Support contact)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
],
"url": "https://support.industry.siemens.com/cs/document/109756957"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-00010",
"CSAFPID-00011",
"CSAFPID-00012",
"CSAFPID-00013",
"CSAFPID-00014",
"CSAFPID-00015",
"CSAFPID-00016",
"CSAFPID-00017",
"CSAFPID-00018",
"CSAFPID-00019",
"CSAFPID-00020",
"CSAFPID-00021",
"CSAFPID-00022",
"CSAFPID-00023",
"CSAFPID-00024",
"CSAFPID-00025",
"CSAFPID-00026",
"CSAFPID-00027",
"CSAFPID-00028",
"CSAFPID-00029",
"CSAFPID-00030",
"CSAFPID-00031",
"CSAFPID-00032",
"CSAFPID-00033",
"CSAFPID-00034",
"CSAFPID-00035",
"CSAFPID-00036",
"CSAFPID-00037",
"CSAFPID-00038",
"CSAFPID-00039",
"CSAFPID-00040",
"CSAFPID-00041",
"CSAFPID-00042",
"CSAFPID-00043",
"CSAFPID-00044",
"CSAFPID-00045",
"CSAFPID-00046",
"CSAFPID-00047",
"CSAFPID-00048",
"CSAFPID-00049",
"CSAFPID-00050",
"CSAFPID-00051",
"CSAFPID-00052",
"CSAFPID-00053",
"CSAFPID-00054",
"CSAFPID-00055",
"CSAFPID-00056",
"CSAFPID-00057",
"CSAFPID-00058",
"CSAFPID-00059",
"CSAFPID-00060",
"CSAFPID-00061",
"CSAFPID-00062",
"CSAFPID-00063",
"CSAFPID-00064",
"CSAFPID-00065",
"CSAFPID-00066",
"CSAFPID-00067",
"CSAFPID-00068",
"CSAFPID-00069",
"CSAFPID-00070",
"CSAFPID-00071",
"CSAFPID-00072",
"CSAFPID-00073",
"CSAFPID-00074",
"CSAFPID-00075",
"CSAFPID-00076",
"CSAFPID-00077",
"CSAFPID-00078",
"CSAFPID-00079",
"CSAFPID-00080",
"CSAFPID-00081",
"CSAFPID-00082",
"CSAFPID-00083",
"CSAFPID-00084",
"CSAFPID-00085",
"CSAFPID-00086",
"CSAFPID-00087",
"CSAFPID-00088",
"CSAFPID-00089",
"CSAFPID-00090",
"CSAFPID-00091",
"CSAFPID-00092",
"CSAFPID-00093",
"CSAFPID-00094",
"CSAFPID-00095",
"CSAFPID-00096",
"CSAFPID-00097",
"CSAFPID-00098",
"CSAFPID-00099",
"CSAFPID-000100",
"CSAFPID-000101",
"CSAFPID-000102",
"CSAFPID-000103",
"CSAFPID-000104",
"CSAFPID-000105",
"CSAFPID-000106",
"CSAFPID-000107"
]
}
],
"title": "CVE-2019-11479"
}
]
}
ICSA-23-234-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Hitachi Energy",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to compromise availability, integrity, and confidentiality of the targeted devices.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Switzerland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-23-234-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-234-01.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-23-234-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-234-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Hitachi Energy AFF66x",
"tracking": {
"current_release_date": "2023-08-22T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-234-01",
"initial_release_date": "2023-08-22T06:00:00.000000Z",
"revision_history": [
{
"date": "2023-08-22T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 03.0.02",
"product": {
"name": "AFF660/665: \u003c= 03.0.02",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "AFF660/665"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43523",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names DNS servers returned via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo could lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43523"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-13817",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 could allow remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must rely on unauthenticated IPv4 time sources. There must be an off-path attacker who could query time from the victim\u0027s ntpd instance.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13817"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-11868",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"category": "summary",
"text": "ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 could allow an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address because transmissions are rescheduled even when a packet lacks a valid origin timestamp.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-11868"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "TCP_SKB_CB(skb)-\u003etcp_gso_segs value is subject to an integer overflow in the Linux kernel when handling TCP selective acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11477"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-3204",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability named \"non-responsive delegation attack\" (NRDelegation attack) has been discovered in various DNS resolving software. The NRDelegation attack works by having a malicious delegation with a considerable number of non-responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers. The attack could cause a resolver to spend time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It could trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation, which could lead to degraded performance and eventually denial of service in orchestrated attacks. Unbound does not suffer from high CPU usage, but still requires resources to resolve the malicious delegation. Unbound will continue to try to resolve the record until it reaches hard limits. Based on the nature of the attack and the replies, Unbound could reach different limits. From version 1.16.3 on, Unbound introduces fixes for better performance when under load by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3204"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2018-18066",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "snmp_oid_compare in snmplib/snmp_api.c in NetSNMP before 5.8 has a NULL pointer exception bug that an unauthenticated attacker could use to remotely cause the instance to crash via a crafted UDP packet, resulting in denial of service.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18066"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
icsa-23-234-01
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Hitachi Energy",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker to compromise availability, integrity, and confidentiality of the targeted devices.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Switzerland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-23-234-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-234-01.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-23-234-01 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-234-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Hitachi Energy AFF66x",
"tracking": {
"current_release_date": "2023-08-22T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-234-01",
"initial_release_date": "2023-08-22T06:00:00.000000Z",
"revision_history": [
{
"date": "2023-08-22T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 03.0.02",
"product": {
"name": "AFF660/665: \u003c= 03.0.02",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "AFF660/665"
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43523",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names DNS servers returned via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo could lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43523"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-13817",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"notes": [
{
"category": "summary",
"text": "ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 could allow remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must rely on unauthenticated IPv4 time sources. There must be an off-path attacker who could query time from the victim\u0027s ntpd instance.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13817"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2020-11868",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"category": "summary",
"text": "ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 could allow an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address because transmissions are rescheduled even when a packet lacks a valid origin timestamp.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-11868"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "TCP_SKB_CB(skb)-\u003etcp_gso_segs value is subject to an integer overflow in the Linux kernel when handling TCP selective acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11477"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2022-3204",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability named \"non-responsive delegation attack\" (NRDelegation attack) has been discovered in various DNS resolving software. The NRDelegation attack works by having a malicious delegation with a considerable number of non-responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers. The attack could cause a resolver to spend time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It could trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation, which could lead to degraded performance and eventually denial of service in orchestrated attacks. Unbound does not suffer from high CPU usage, but still requires resources to resolve the malicious delegation. Unbound will continue to try to resolve the record until it reaches hard limits. Based on the nature of the attack and the replies, Unbound could reach different limits. From version 1.16.3 on, Unbound introduces fixes for better performance when under load by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3204"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2018-18066",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "snmp_oid_compare in snmplib/snmp_api.c in NetSNMP before 5.8 has a NULL pointer exception bug that an unauthenticated attacker could use to remotely cause the instance to crash via a crafted UDP packet, resulting in denial of service.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18066"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following actions:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to upcoming AFF660/665 FW 04.6.01 release when available.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure only trusted DNS server(s).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Configure the NTP service with redundant trustworthy sources of time.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Restrict TCP/IP-based management protocols to trusted IP addresses.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Disable the SNMP server (CLI and web interface will continue to function as they use an internal connection).",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Hitachi Energy recommends the following general mitigations:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Recommended security practices and firewall configurations could help protect a process control network from attacks originating from outside the network.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Physically protect process control systems from direct access by unauthorized personnel.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Ensure process control systems have no direct connections to the internet and are separated from other networks via a firewall system with minimal exposed ports.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Do not use process control systems for internet surfing, instant messaging, or receiving emails.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Scan portable computers and removable storage media for malware prior connection to a control system.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information, see Hitachi Energy\u0027s Security Advisory: 8DBD000167.",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000167"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
RHSA-2019:1485
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698103)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712989)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712994)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713000)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1485",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1485.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1485",
"initial_release_date": "2019-06-17T19:35:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:35:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:35:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product_id": "kernel-0:3.10.0-327.79.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.79.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.79.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1699
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4). (BZ#1721058, BZ#1721062, BZ#1721065)\n\nSecurity Fix(es):\n\n* kernel: tcp: integer ovrtflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161)\n\n* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166)\n\n* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167)\n\n* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1699",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "1721365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1699.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T19:05:01+00:00",
"generator": {
"date": "2025-10-09T19:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1699",
"initial_release_date": "2019-07-08T09:19:57+00:00",
"revision_history": [
{
"date": "2019-07-08T09:19:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-07-08T09:19:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.4-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.4-20190620.3.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.4-20190620.3.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10161",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720115"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.\n* On Red Hat Enterprise Linux 6, the impact of this vulnerability is limited to denial of service or disclosing the existence of arbitrary files. Privilege escalation is not possible. For RHEL6, this CVE is rated as Moderate severity with 7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10161"
},
{
"category": "external",
"summary": "RHBZ#1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10161",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API"
},
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10166",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720114"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10166"
},
{
"category": "external",
"summary": "RHBZ#1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10167",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720117"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectGetDomainCapabilities() libvirt API accepts an \"emulatorbin\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10167"
},
{
"category": "external",
"summary": "RHBZ#1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10167",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10167"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10168",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720118"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an \"emulator\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10168"
},
{
"category": "external",
"summary": "RHBZ#1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10168"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1479
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [HPE 8.0 Bug] nvme drive power button does not turn off drive (BZ#1700288)\n\n* RHEL8.0 - hw csum failure seen in dmesg and console (using mlx5/mlx4/Mellanox) (BZ#1700289)\n\n* RHEL8.0 - vfio-ap: add subsystem to matrix device to avoid libudev failures (kvm) (BZ#1700290)\n\n* [FJ8.1 Bug]: Make Fujitsu Erratum 010001 patch work on A64FX v1r0 (BZ#1700901)\n\n* [FJ8.0 Bug]: Fujitsu A64FX processor errata - panic by unknown fault (BZ#1700902)\n\n* RHEL 8.0 Snapshot 4 - nvme create-ns command hangs after creating 20 namespaces on Bolt (NVMe) (BZ#1701140)\n\n* [Cavium/Marvell 8.0 qed] Fix qed_mcp_halt() and qed_mcp_resume() (backporting bug) (BZ#1704184)\n\n* [Intel 8.1 Bug] PBF: Base frequency display fix (BZ#1706739)\n\n* [RHEL8]read/write operation not permitted to /sys/kernel/debug/gcov/reset (BZ#1708100)\n\n* RHEL8.0 - ISST-LTE:pVM:fleetwood:LPM:raylp85:After lpm seeing the console logs on the the lpar at target side (BZ#1708102)\n\n* RHEL8.0 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1708112)\n\n* [Regression] RHEL8.0 - System crashed with one stress-ng-mremap stressor on Boston (kvm host) (BZ#1708617)\n\n* [intel ice Rhel 8 RC1] ethtool -A ethx causes interfaces to go down (BZ#1709433)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1479",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1479.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T08:24:55+00:00",
"generator": {
"date": "2024-11-15T08:24:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1479",
"initial_release_date": "2019-06-17T18:01:46+00:00",
"revision_history": [
{
"date": "2019-06-17T18:01:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:01:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T08:24:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1487
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1487",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1711010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711010"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1487.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:03:57+00:00",
"generator": {
"date": "2025-10-09T18:03:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1487",
"initial_release_date": "2019-06-17T19:56:43+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:03:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1488
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1710081)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1710121)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1710517)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1488",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1488.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:21+00:00",
"generator": {
"date": "2025-10-09T19:42:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1488",
"initial_release_date": "2019-06-17T18:32:36+00:00",
"revision_history": [
{
"date": "2019-06-17T18:32:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:32:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product_id": "kernel-0:2.6.32-754.15.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.15.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1482
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1482",
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1482.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:11:52+00:00",
"generator": {
"date": "2024-11-15T03:11:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1482",
"initial_release_date": "2019-06-17T19:10:13+00:00",
"revision_history": [
{
"date": "2019-06-17T19:10:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:10:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product_id": "kernel-0:3.10.0-862.34.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.34.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.34.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1483
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Mistmach between \u0027tty-\u003etermios-\u003ec_lflag\u0027 and \u0027ldata-\u003eicanon\u0027 for \u0027ICANON\u0027 (BZ#1708061)\n\n* RHEL7: rwsem reader/writer mutual exclusion guarantee may not work (BZ#1709702)\n\n* hardened usercopy is causing crash (BZ#1712311)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712991)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712996)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713002)\n\n* [debug kernel] [x86_64]INFO: possible circular locking dependency detected (BZ#1715326)\n\n* RHEL-7.7: tty: termios_rwsem possible deadlock (BZ#1715329)\n\nEnhancement(s):\n\n* [MCHP 7.7 FEAT] Update smartpqi driver to latest upstream (BZ#1709467)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1483",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1483.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T18:03:57+00:00",
"generator": {
"date": "2025-10-09T18:03:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1483",
"initial_release_date": "2019-06-17T19:14:57+00:00",
"revision_history": [
{
"date": "2019-06-17T19:14:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:14:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:03:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product_id": "kernel-0:3.10.0-693.50.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.50.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.50.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1481",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1481.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:11:04+00:00",
"generator": {
"date": "2024-11-15T03:11:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1481",
"initial_release_date": "2019-06-17T18:45:40+00:00",
"revision_history": [
{
"date": "2019-06-17T18:45:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:45:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.21.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.21.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product_id": "kernel-0:3.10.0-957.21.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1486
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1486",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1486.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1486",
"initial_release_date": "2019-06-17T19:59:48+00:00",
"revision_history": [
{
"date": "2019-06-17T19:59:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:59:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-957.21.3.rt56.935.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1484
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698104)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712990)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712995)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713001)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1484",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1484.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1484",
"initial_release_date": "2019-06-17T19:40:37+00:00",
"revision_history": [
{
"date": "2019-06-17T19:40:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:40:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product_id": "kernel-0:3.10.0-514.66.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.66.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.66.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1486
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1486",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1486.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-15T03:12:00+00:00",
"generator": {
"date": "2024-11-15T03:12:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1486",
"initial_release_date": "2019-06-17T19:59:48+00:00",
"revision_history": [
{
"date": "2019-06-17T19:59:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:59:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:12:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-957.21.3.rt56.935.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1487
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1487",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1711010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711010"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1487.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T03:11:06+00:00",
"generator": {
"date": "2024-11-15T03:11:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1487",
"initial_release_date": "2019-06-17T19:56:43+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1594
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this updated as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1594",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1721369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1594.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1594",
"initial_release_date": "2019-06-25T09:20:04+00:00",
"revision_history": [
{
"date": "2019-06-25T09:20:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T09:20:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-11.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20190618.0.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-11.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20190618.0.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1490
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713025)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713028)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713043)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1490",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1490.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1490",
"initial_release_date": "2019-06-17T19:30:07+00:00",
"revision_history": [
{
"date": "2019-06-17T19:30:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:30:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.95.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product_id": "kernel-0:2.6.32-431.95.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.95.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1480
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1480",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1480.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:14+00:00",
"generator": {
"date": "2025-10-09T19:42:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1480",
"initial_release_date": "2019-06-17T19:56:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1602
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1602",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1602.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1602",
"initial_release_date": "2019-06-25T18:10:59+00:00",
"revision_history": [
{
"date": "2019-06-25T18:10:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T18:10:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.8.2.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.8.2.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_id": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.8.2.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1483
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Mistmach between \u0027tty-\u003etermios-\u003ec_lflag\u0027 and \u0027ldata-\u003eicanon\u0027 for \u0027ICANON\u0027 (BZ#1708061)\n\n* RHEL7: rwsem reader/writer mutual exclusion guarantee may not work (BZ#1709702)\n\n* hardened usercopy is causing crash (BZ#1712311)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712991)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712996)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713002)\n\n* [debug kernel] [x86_64]INFO: possible circular locking dependency detected (BZ#1715326)\n\n* RHEL-7.7: tty: termios_rwsem possible deadlock (BZ#1715329)\n\nEnhancement(s):\n\n* [MCHP 7.7 FEAT] Update smartpqi driver to latest upstream (BZ#1709467)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1483",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1483.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T03:10:58+00:00",
"generator": {
"date": "2024-11-15T03:10:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1483",
"initial_release_date": "2019-06-17T19:14:57+00:00",
"revision_history": [
{
"date": "2019-06-17T19:14:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:14:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:10:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product_id": "kernel-0:3.10.0-693.50.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.50.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.50.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1483
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Mistmach between \u0027tty-\u003etermios-\u003ec_lflag\u0027 and \u0027ldata-\u003eicanon\u0027 for \u0027ICANON\u0027 (BZ#1708061)\n\n* RHEL7: rwsem reader/writer mutual exclusion guarantee may not work (BZ#1709702)\n\n* hardened usercopy is causing crash (BZ#1712311)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712991)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712996)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713002)\n\n* [debug kernel] [x86_64]INFO: possible circular locking dependency detected (BZ#1715326)\n\n* RHEL-7.7: tty: termios_rwsem possible deadlock (BZ#1715329)\n\nEnhancement(s):\n\n* [MCHP 7.7 FEAT] Update smartpqi driver to latest upstream (BZ#1709467)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1483",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1483.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T18:03:57+00:00",
"generator": {
"date": "2025-10-09T18:03:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1483",
"initial_release_date": "2019-06-17T19:14:57+00:00",
"revision_history": [
{
"date": "2019-06-17T19:14:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:14:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:03:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.src",
"product_id": "kernel-0:3.10.0-693.50.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.50.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.50.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.50.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.50.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.50.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:14:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.50.3.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.50.3.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.50.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1488
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1710081)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1710121)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1710517)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1488",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1488.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:21+00:00",
"generator": {
"date": "2025-10-09T19:42:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1488",
"initial_release_date": "2019-06-17T18:32:36+00:00",
"revision_history": [
{
"date": "2019-06-17T18:32:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:32:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product_id": "kernel-0:2.6.32-754.15.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.15.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1480
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1480",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1480.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T08:25:08+00:00",
"generator": {
"date": "2024-11-15T08:25:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1480",
"initial_release_date": "2019-06-17T19:56:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T08:25:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1481",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1481.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:16+00:00",
"generator": {
"date": "2025-10-09T19:42:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1481",
"initial_release_date": "2019-06-17T18:45:40+00:00",
"revision_history": [
{
"date": "2019-06-17T18:45:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:45:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.21.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.21.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product_id": "kernel-0:3.10.0-957.21.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1484
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698104)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712990)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712995)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713001)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1484",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1484.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1484",
"initial_release_date": "2019-06-17T19:40:37+00:00",
"revision_history": [
{
"date": "2019-06-17T19:40:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:40:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product_id": "kernel-0:3.10.0-514.66.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.66.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.66.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1484
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698104)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712990)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712995)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713001)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1484",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1484.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T03:11:29+00:00",
"generator": {
"date": "2024-11-15T03:11:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1484",
"initial_release_date": "2019-06-17T19:40:37+00:00",
"revision_history": [
{
"date": "2019-06-17T19:40:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:40:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.src",
"product_id": "kernel-0:3.10.0-514.66.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.66.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.66.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.66.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.66.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:40:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.66.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.66.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.66.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1699
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4). (BZ#1721058, BZ#1721062, BZ#1721065)\n\nSecurity Fix(es):\n\n* kernel: tcp: integer ovrtflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161)\n\n* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166)\n\n* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167)\n\n* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1699",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "1721365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1699.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security and enhancement update",
"tracking": {
"current_release_date": "2024-11-15T03:12:02+00:00",
"generator": {
"date": "2024-11-15T03:12:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1699",
"initial_release_date": "2019-07-08T09:19:57+00:00",
"revision_history": [
{
"date": "2019-07-08T09:19:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-07-08T09:19:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:12:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.4-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.4-20190620.3.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.4-20190620.3.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10161",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720115"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.\n* On Red Hat Enterprise Linux 6, the impact of this vulnerability is limited to denial of service or disclosing the existence of arbitrary files. Privilege escalation is not possible. For RHEL6, this CVE is rated as Moderate severity with 7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10161"
},
{
"category": "external",
"summary": "RHBZ#1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10161",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API"
},
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10166",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720114"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10166"
},
{
"category": "external",
"summary": "RHBZ#1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10167",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720117"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectGetDomainCapabilities() libvirt API accepts an \"emulatorbin\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10167"
},
{
"category": "external",
"summary": "RHBZ#1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10167",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10167"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10168",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720118"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an \"emulator\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10168"
},
{
"category": "external",
"summary": "RHBZ#1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10168"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1594
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this updated as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1594",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1721369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1594.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security update",
"tracking": {
"current_release_date": "2024-11-15T03:11:56+00:00",
"generator": {
"date": "2024-11-15T03:11:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1594",
"initial_release_date": "2019-06-25T09:20:04+00:00",
"revision_history": [
{
"date": "2019-06-25T09:20:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T09:20:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-11.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20190618.0.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-11.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20190618.0.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1489
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713026)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713029)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713044)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1489",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1489.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:21+00:00",
"generator": {
"date": "2025-10-09T19:42:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1489",
"initial_release_date": "2019-06-17T19:29:12+00:00",
"revision_history": [
{
"date": "2019-06-17T19:29:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:29:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.79.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product_id": "kernel-0:2.6.32-504.79.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1489
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713026)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713029)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713044)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1489",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1489.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:21+00:00",
"generator": {
"date": "2025-10-09T19:42:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1489",
"initial_release_date": "2019-06-17T19:29:12+00:00",
"revision_history": [
{
"date": "2019-06-17T19:29:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:29:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.79.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product_id": "kernel-0:2.6.32-504.79.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1485
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698103)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712989)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712994)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713000)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1485",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1485.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1485",
"initial_release_date": "2019-06-17T19:35:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:35:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:35:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product_id": "kernel-0:3.10.0-327.79.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.79.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.79.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1490
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713025)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713028)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713043)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1490",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1490.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1490",
"initial_release_date": "2019-06-17T19:30:07+00:00",
"revision_history": [
{
"date": "2019-06-17T19:30:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:30:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.95.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product_id": "kernel-0:2.6.32-431.95.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.95.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1481
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1481",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1481.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:16+00:00",
"generator": {
"date": "2025-10-09T19:42:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1481",
"initial_release_date": "2019-06-17T18:45:40+00:00",
"revision_history": [
{
"date": "2019-06-17T18:45:40+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:45:40+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "perf-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.21.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.21.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.src",
"product_id": "kernel-0:3.10.0-957.21.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.21.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.21.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.21.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:45:40+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Client-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Client-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Client-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7ComputeNode-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7ComputeNode-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Server-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Server-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:bpftool-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.src",
"7Workstation-optional-7.6.Z:kernel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-abi-whitelists-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-bootwrapper-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debug-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-s390x-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-debuginfo-common-x86_64-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-doc-0:3.10.0-957.21.3.el7.noarch",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-headers-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-kdump-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-kdump-devel-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:kernel-tools-libs-devel-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-0:3.10.0-957.21.3.el7.x86_64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.ppc64le",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.s390x",
"7Workstation-optional-7.6.Z:python-perf-debuginfo-0:3.10.0-957.21.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1602
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1602",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1602.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security update",
"tracking": {
"current_release_date": "2024-11-15T03:11:45+00:00",
"generator": {
"date": "2024-11-15T03:11:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1602",
"initial_release_date": "2019-06-25T18:10:59+00:00",
"revision_history": [
{
"date": "2019-06-25T18:10:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T18:10:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.8.2.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.8.2.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_id": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.8.2.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1482
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1482",
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1482.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:19+00:00",
"generator": {
"date": "2025-10-09T19:42:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1482",
"initial_release_date": "2019-06-17T19:10:13+00:00",
"revision_history": [
{
"date": "2019-06-17T19:10:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:10:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product_id": "kernel-0:3.10.0-862.34.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.34.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.34.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1482
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1482",
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1482.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:19+00:00",
"generator": {
"date": "2025-10-09T19:42:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1482",
"initial_release_date": "2019-06-17T19:10:13+00:00",
"revision_history": [
{
"date": "2019-06-17T19:10:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:10:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.src",
"product_id": "kernel-0:3.10.0-862.34.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.34.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.34.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.34.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.34.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.34.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:10:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.34.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.34.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.34.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1488
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1710081)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1710121)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1710517)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1488",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1488.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T13:22:20+00:00",
"generator": {
"date": "2024-11-22T13:22:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1488",
"initial_release_date": "2019-06-17T18:32:36+00:00",
"revision_history": [
{
"date": "2019-06-17T18:32:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:32:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T13:22:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.src",
"product_id": "kernel-0:2.6.32-754.15.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.15.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.15.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_id": "perf-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.15.3.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "perf-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.15.3.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.15.3.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:32:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.15.3.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.15.3.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.15.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1602
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1602",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1602.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1602",
"initial_release_date": "2019-06-25T18:10:59+00:00",
"revision_history": [
{
"date": "2019-06-25T18:10:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T18:10:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.8.2.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.8.2.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.8.2.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_id": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.8.2.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.8.2.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.8.2.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T18:10:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.8.2.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.8.2.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.8.2.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.8.2.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1486
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1486",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1486.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:20+00:00",
"generator": {
"date": "2025-10-09T19:42:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1486",
"initial_release_date": "2019-06-17T19:59:48+00:00",
"revision_history": [
{
"date": "2019-06-17T19:59:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:59:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-957.21.3.rt56.935.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_id": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-957.21.3.rt56.935.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-957.21.3.rt56.935.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.6.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:59:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-NFV-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-NFV-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-NFV-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.src",
"7Server-RT-7.6.Z:kernel-rt-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-doc-0:3.10.0-957.21.3.rt56.935.el7.noarch",
"7Server-RT-7.6.Z:kernel-rt-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-devel-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-0:3.10.0-957.21.3.rt56.935.el7.x86_64",
"7Server-RT-7.6.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-957.21.3.rt56.935.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1479
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [HPE 8.0 Bug] nvme drive power button does not turn off drive (BZ#1700288)\n\n* RHEL8.0 - hw csum failure seen in dmesg and console (using mlx5/mlx4/Mellanox) (BZ#1700289)\n\n* RHEL8.0 - vfio-ap: add subsystem to matrix device to avoid libudev failures (kvm) (BZ#1700290)\n\n* [FJ8.1 Bug]: Make Fujitsu Erratum 010001 patch work on A64FX v1r0 (BZ#1700901)\n\n* [FJ8.0 Bug]: Fujitsu A64FX processor errata - panic by unknown fault (BZ#1700902)\n\n* RHEL 8.0 Snapshot 4 - nvme create-ns command hangs after creating 20 namespaces on Bolt (NVMe) (BZ#1701140)\n\n* [Cavium/Marvell 8.0 qed] Fix qed_mcp_halt() and qed_mcp_resume() (backporting bug) (BZ#1704184)\n\n* [Intel 8.1 Bug] PBF: Base frequency display fix (BZ#1706739)\n\n* [RHEL8]read/write operation not permitted to /sys/kernel/debug/gcov/reset (BZ#1708100)\n\n* RHEL8.0 - ISST-LTE:pVM:fleetwood:LPM:raylp85:After lpm seeing the console logs on the the lpar at target side (BZ#1708102)\n\n* RHEL8.0 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1708112)\n\n* [Regression] RHEL8.0 - System crashed with one stress-ng-mremap stressor on Boston (kvm host) (BZ#1708617)\n\n* [intel ice Rhel 8 RC1] ethtool -A ethx causes interfaces to go down (BZ#1709433)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1479",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1479.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:13+00:00",
"generator": {
"date": "2025-10-09T19:42:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1479",
"initial_release_date": "2019-06-17T18:01:46+00:00",
"revision_history": [
{
"date": "2019-06-17T18:01:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:01:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1490
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713025)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713028)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713043)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1490",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1490.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T13:22:08+00:00",
"generator": {
"date": "2024-11-22T13:22:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1490",
"initial_release_date": "2019-06-17T19:30:07+00:00",
"revision_history": [
{
"date": "2019-06-17T19:30:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:30:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T13:22:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.95.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.95.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.95.3.el6.src",
"product_id": "kernel-0:2.6.32-431.95.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.95.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.95.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.95.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:30:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.95.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.95.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.95.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1594
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this updated as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1594",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1721369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721369"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1594.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security update",
"tracking": {
"current_release_date": "2025-10-09T19:42:22+00:00",
"generator": {
"date": "2025-10-09T19:42:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1594",
"initial_release_date": "2019-06-25T09:20:04+00:00",
"revision_history": [
{
"date": "2019-06-25T09:20:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-25T09:20:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-11.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-11.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20190618.0.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-11.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20190618.0.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-25T09:20:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20190618.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20190618.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-11.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-11.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1480
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL8.0.z batch#1 source tree (BZ#1704955)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1480",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1480.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:14+00:00",
"generator": {
"date": "2025-10-09T19:42:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1480",
"initial_release_date": "2019-06-17T19:56:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-80.4.2.rt9.152.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_id": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-80.4.2.rt9.152.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "NFV-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"relates_to_product_reference": "RT-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"NFV-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"NFV-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.src",
"RT-8.0.0.Z:kernel-rt-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-core-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debug-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-debuginfo-common-x86_64-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-devel-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-kvm-debuginfo-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64",
"RT-8.0.0.Z:kernel-rt-modules-extra-0:4.18.0-80.4.2.rt9.152.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1487
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB-access (CVE-2018-7566)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1487",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1711010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711010"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1487.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:03:57+00:00",
"generator": {
"date": "2025-10-09T18:03:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1487",
"initial_release_date": "2019-06-17T19:56:43+00:00",
"revision_history": [
{
"date": "2019-06-17T19:56:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:56:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:03:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.50.3.rt56.644.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.50.3.rt56.644.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-1000004",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1535315"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in sound system can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "RHBZ#1535315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004"
}
],
"release_date": "2018-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in sound system can lead to denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:56:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.50.3.rt56.644.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.50.3.rt56.644.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1485
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698103)\n\n* [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712989)\n\n* [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712994)\n\n* WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713000)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1485",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1485.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T03:11:45+00:00",
"generator": {
"date": "2024-11-15T03:11:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1485",
"initial_release_date": "2019-06-17T19:35:59+00:00",
"revision_history": [
{
"date": "2019-06-17T19:35:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:35:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:11:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.79.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.79.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.79.2.el7.src",
"product_id": "kernel-0:3.10.0-327.79.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.79.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.79.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.79.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.79.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:35:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.79.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.79.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.79.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019:1479
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms (CVE-2019-9213)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [HPE 8.0 Bug] nvme drive power button does not turn off drive (BZ#1700288)\n\n* RHEL8.0 - hw csum failure seen in dmesg and console (using mlx5/mlx4/Mellanox) (BZ#1700289)\n\n* RHEL8.0 - vfio-ap: add subsystem to matrix device to avoid libudev failures (kvm) (BZ#1700290)\n\n* [FJ8.1 Bug]: Make Fujitsu Erratum 010001 patch work on A64FX v1r0 (BZ#1700901)\n\n* [FJ8.0 Bug]: Fujitsu A64FX processor errata - panic by unknown fault (BZ#1700902)\n\n* RHEL 8.0 Snapshot 4 - nvme create-ns command hangs after creating 20 namespaces on Bolt (NVMe) (BZ#1701140)\n\n* [Cavium/Marvell 8.0 qed] Fix qed_mcp_halt() and qed_mcp_resume() (backporting bug) (BZ#1704184)\n\n* [Intel 8.1 Bug] PBF: Base frequency display fix (BZ#1706739)\n\n* [RHEL8]read/write operation not permitted to /sys/kernel/debug/gcov/reset (BZ#1708100)\n\n* RHEL8.0 - ISST-LTE:pVM:fleetwood:LPM:raylp85:After lpm seeing the console logs on the the lpar at target side (BZ#1708102)\n\n* RHEL8.0 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1708112)\n\n* [Regression] RHEL8.0 - System crashed with one stress-ng-mremap stressor on Boston (kvm host) (BZ#1708617)\n\n* [intel ice Rhel 8 RC1] ethtool -A ethx causes interfaces to go down (BZ#1709433)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1479",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1479.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T19:42:13+00:00",
"generator": {
"date": "2025-10-09T19:42:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1479",
"initial_release_date": "2019-06-17T18:01:46+00:00",
"revision_history": [
{
"date": "2019-06-17T18:01:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T18:01:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:42:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-80.4.2.el8_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.4.2.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_id": "kernel-0:4.18.0-80.4.2.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.4.2.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.src",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"relates_to_product_reference": "CRB-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"relates_to_product_reference": "CRB-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9213",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2019-03-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1686136"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9213"
},
{
"category": "external",
"summary": "RHBZ#1686136",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686136"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9213"
}
],
"release_date": "2019-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "Enabling selinux prevents the public exploit from working correctly.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T18:01:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"BaseOS-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"BaseOS-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:bpftool-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.src",
"CRB-8.0.0.Z:kernel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-abi-whitelists-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-cross-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-core-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debug-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-debuginfo-common-aarch64-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-debuginfo-common-ppc64le-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-debuginfo-common-s390x-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-debuginfo-common-x86_64-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-doc-0:4.18.0-80.4.2.el8_0.noarch",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-headers-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-modules-extra-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-tools-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:kernel-tools-libs-devel-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:kernel-zfcpdump-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-core-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-devel-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:kernel-zfcpdump-modules-extra-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-0:4.18.0-80.4.2.el8_0.x86_64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.aarch64",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.ppc64le",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.s390x",
"CRB-8.0.0.Z:python3-perf-debuginfo-0:4.18.0-80.4.2.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
RHSA-2019:1699
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4). (BZ#1721058, BZ#1721062, BZ#1721065)\n\nSecurity Fix(es):\n\n* kernel: tcp: integer ovrtflow while processing SACK blocks allows remote denial of service (CVE-2019-11477)\n\n* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161)\n\n* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166)\n\n* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167)\n\n* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1699",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "1721365",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721365"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1699.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security and enhancement update",
"tracking": {
"current_release_date": "2025-10-09T19:05:01+00:00",
"generator": {
"date": "2025-10-09T19:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:1699",
"initial_release_date": "2019-07-08T09:19:57+00:00",
"revision_history": [
{
"date": "2019-07-08T09:19:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-07-08T09:19:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.4-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.4-20190620.3.el7_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.4-1.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.4-20190620.3.el7_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10161",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720115"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.\n* On Red Hat Enterprise Linux 6, the impact of this vulnerability is limited to denial of service or disclosing the existence of arbitrary files. Privilege escalation is not possible. For RHEL6, this CVE is rated as Moderate severity with 7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10161"
},
{
"category": "external",
"summary": "RHBZ#1720115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10161",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10161"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API"
},
{
"acknowledgments": [
{
"names": [
"Matthias Gerstner"
],
"organization": "SUSE"
}
],
"cve": "CVE-2019-10166",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720114"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10166"
},
{
"category": "external",
"summary": "RHBZ#1720114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10166"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10167",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720117"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectGetDomainCapabilities() libvirt API accepts an \"emulatorbin\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10167"
},
{
"category": "external",
"summary": "RHBZ#1720117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10167",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10167"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10167"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectGetDomainCapabilities API"
},
{
"acknowledgments": [
{
"names": [
"Jan Tomko"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-10168",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2019-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1720118"
}
],
"notes": [
{
"category": "description",
"text": "The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an \"emulator\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability requires access to the libvirt socket, normally in /var/run/libvirt/libvirt_sock_ro. Typically in hypervisor environments, local user accounts are not supported so no untrusted users should be able to access this socket.\n* Red Hat Gluster Storage 3 is not affected by this vulnerability as libvirtd daemon is not shipped in Gluster.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10168"
},
{
"category": "external",
"summary": "RHBZ#1720118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10168"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10168"
},
{
"category": "external",
"summary": "https://access.redhat.com/libvirt-privesc-vulnerabilities",
"url": "https://access.redhat.com/libvirt-privesc-vulnerabilities"
}
],
"release_date": "2019-06-20T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "The Unix permissions of libvirt\u0027s read-only socket can be made more restrictive than the default (0777) by editing `/etc/libvirt/libvirtd.conf`. The settings `unix_sock_group = libvirt` and `unix_sock_ro_perms = 0770` will restrict access to only members of `libvirt`, who already have management access to virtual machines.",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-08T09:19:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.4-20190620.3.el7_6.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.4-20190620.3.el7_6.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.4-1.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.4-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
rhsa-2019_1489
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)\n\n* kernel: Double free in lib/idr.c (CVE-2019-3896)\n\n* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)\n\n* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* MDS mitigations not enabled on Intel Skylake CPUs (BZ#1713026)\n\n* [RHEL6] md_clear flag missing from /proc/cpuinfo (BZ#1713029)\n\n* RHEL6 kernel does not disable SMT with mds=full,nosmt (BZ#1713044)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1489",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"category": "external",
"summary": "1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1489.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T13:22:14+00:00",
"generator": {
"date": "2024-11-22T13:22:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:1489",
"initial_release_date": "2019-06-17T19:29:12+00:00",
"revision_history": [
{
"date": "2019-06-17T19:29:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-06-17T19:29:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T13:22:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.79.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.79.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.79.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.79.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.79.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.79.3.el6.src",
"product_id": "kernel-0:2.6.32-504.79.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.79.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Eiichi Tsukata"
]
}
],
"cve": "CVE-2019-3896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2019-04-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1694812"
}
],
"notes": [
{
"category": "description",
"text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in lib/idr.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3896"
},
{
"category": "external",
"summary": "RHBZ#1694812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3896"
}
],
"release_date": "2019-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Double free in lib/idr.c"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11477",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719123"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "RHBZ#1719123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719123"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11478",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719128"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel\u0027s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "RHBZ#1719128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719128"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11478"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jonathan Looney"
],
"organization": "Netflix Information Security"
}
],
"cve": "CVE-2019-11479",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2019-06-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1719129"
}
],
"notes": [
{
"category": "description",
"text": "An excessive resource consumption flaw was found in the way the Linux kernel\u0027s networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel\u0027s resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack\n\nRed Hat Enterprise Linux 5 is now in the Extended Life Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "RHBZ#1719129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11479"
},
{
"category": "external",
"summary": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310",
"url": "https://patchwork.ozlabs.org/project/netdev/list/?series=114310"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2019/06/17/5",
"url": "https://www.openwall.com/lists/oss-security/2019/06/17/5"
}
],
"release_date": "2019-06-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-06-17T19:29:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "workaround",
"details": "For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.79.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.79.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.79.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service"
}
]
}
CERTFR-2020-AVI-198
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO | ||
| Owncloud | Core | JATP-OS All-In-One et JATP-OS Core versions antérieures à 5.0.6.0 | ||
| N/A | N/A | Série NFX250 versions antérieures à 19.2R1 | ||
| N/A | N/A | JSA versions antérieures à 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved 19.1R1-EVO, 19.2R1-EVO et 19.3R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "JATP-OS All-In-One et JATP-OS Core versions ant\u00e9rieures \u00e0 5.0.6.0",
"product": {
"name": "Core",
"vendor": {
"name": "Owncloud",
"scada": false
}
}
},
{
"description": "S\u00e9rie NFX250 versions ant\u00e9rieures \u00e0 19.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "JSA versions ant\u00e9rieures \u00e0 7.3.2 Patch 5 et 7.3.3 Patch 1 FixPack 1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D86, 12.3R12-S14, 12.3X48-D80, 12.3X48-D86, 12.3X48-D90, 12.3X48-D95, 14.1X53-D51, 14.1X53-D53, 15.1F6-S13, 15.1R7-S4, 15.1R7-S5, 15.1R7-S6, 15.1X49-D180, 15.1X49-D181, 15.1X49-D190, 15.1X49-D200, 15.1X49-D210, 15.1X53-D238, 15.1X53-D497, 15.1X53-D592, 15.1X53-D593, 16.1R4-S13, 16.1R7-S4, 16.1R7-S6, 16.1R7-S7, 16.2R2-S10, 16.2R2-S11, 17.1R2-S11, 17.1R3, 17.1R3-S1, 17.1R3-S2, 17.2R1-S9, 17.2R2-S7, 17.2R2-S8, 17.2R3, 17.2R3-S3, 17.2X75-D102, 17.2X75-D105, 17.2X75-D110, 17.2X75-D44, 17.3R2-S5, 17.3R3-S5, 17.3R3-S6, 17.3R3-S7, 17.4R1-S8, 17.4R2, 17.4R2-S5, 17.4R2-S6, 17.4R2-S7, 17.4R2-S8, 17.4R2-S9, 17.4R3, 18.1R2-S4, 18.1R3, 18.1R3-S4, 18.1R3-S7, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S5, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S1, 18.2R3-S2, 18.2R3-S3, 18.2X75-D12, 18.2X75-D20, 18.2X75-D30, 18.2X75-D33, 18.2X75-D410, 18.2X75-D411, 18.2X75-D420, 18.2X75-D50, 18.2X75-D51, 18.2X75-D60, 18.3R1-S5, 18.3R1-S6, 18.3R1-S7, 18.3R2, 18.3R2-S1, 18.3R2-S2, 18.3R2-S3, 18.3R3, 18.3R3-S1, 18.4R1, 18.4R1-S4, 18.4R1-S5, 18.4R1-S6, 18.4R2, 18.4R2-S1, 18.4R2-S2, 18.4R2-S3, 18.4R3, 19.1R1, 19.1R1-S2, 19.1R1-S3, 19.1R1-S4, 19.1R2, 19.1R3, 19.2R1, 19.2R1-S1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R2, 19.3R1, 19.3R1-S1, 19.3R2, 19.3R3 et 19.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-4556",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4556"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2020-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1621"
},
{
"name": "CVE-2019-4509",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4509"
},
{
"name": "CVE-2019-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4454"
},
{
"name": "CVE-2019-10173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10173"
},
{
"name": "CVE-2020-1626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1626"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2020-1627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1627"
},
{
"name": "CVE-2020-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1620"
},
{
"name": "CVE-2019-4581",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4581"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2018-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6918"
},
{
"name": "CVE-2018-1139",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1139"
},
{
"name": "CVE-2020-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1615"
},
{
"name": "CVE-2018-11784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11784"
},
{
"name": "CVE-2016-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1285"
},
{
"name": "CVE-2020-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1616"
},
{
"name": "CVE-2020-1618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1618"
},
{
"name": "CVE-2018-10858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10858"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4470"
},
{
"name": "CVE-2013-7285",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7285"
},
{
"name": "CVE-2020-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1632"
},
{
"name": "CVE-2020-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1622"
},
{
"name": "CVE-2020-1634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1634"
},
{
"name": "CVE-2018-6916",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6916"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2020-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1623"
},
{
"name": "CVE-2018-11237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11237"
},
{
"name": "CVE-2020-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1619"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0071"
},
{
"name": "CVE-2020-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1629"
},
{
"name": "CVE-2020-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1624"
},
{
"name": "CVE-2020-1625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1625"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2020-1630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1630"
},
{
"name": "CVE-2016-1286",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1286"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-4559"
},
{
"name": "CVE-2020-1613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1613"
},
{
"name": "CVE-2020-1617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1617"
},
{
"name": "CVE-2020-1614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1614"
},
{
"name": "CVE-2020-1628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1628"
}
],
"initial_release_date": "2020-04-09T00:00:00",
"last_revision_date": "2020-04-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-198",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11004 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11004\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10997 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10997\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11002 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11002\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10994 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10994\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11003 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11003\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10998 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10998\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11010 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11010\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11013 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11013\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11009 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11009\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11016 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11016\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10999 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10999\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11014 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11014\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11006 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11006\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11008 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11008\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11005 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11005\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11001 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11001\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10996 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10996\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11007 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11007\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11000 du 08 avril 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11000\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-278
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.6 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server versions TUS 7.2 x86_64, TUS 7.3 x86_64, TUS 7.4 x86_64, TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 8 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server versions AUS 6.5 x86_64, AUS 6.6 x86_64, AUS 7.2 x86_64, AUS 7.3 x86_64, AUS 7.4 x86_64, AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 6 x86_64 | ||
| N/A | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host - Extended Update Support 4.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 8 aarch64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 8 ppc64le |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server versions TUS 7.2 x86_64, TUS 7.3 x86_64, TUS 7.4 x86_64, TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server versions AUS 6.5 x86_64, AUS 6.6 x86_64, AUS 7.2 x86_64, AUS 7.3 x86_64, AUS 7.4 x86_64, AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host - Extended Update Support 4.2 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-9213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9213"
},
{
"name": "CVE-2019-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3896"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"initial_release_date": "2019-06-18T00:00:00",
"last_revision_date": "2019-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-278",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et un\nd\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1484 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1485 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1489 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1480 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1487 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1488 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1481 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1483 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1479 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1490 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2019:1486 du 17 juin 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
}
]
}
CERTFR-2019-AVI-349
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-07-19T00:00:00",
"last_revision_date": "2019-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-349",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191889-1 du 18 juillet 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191889-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191888-1 du 18 juillet 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191888-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191882-1 du 18 juillet 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191882-1/"
}
]
}
CERTFR-2022-AVI-168
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "App Connect Professional versions 7.5.4.0 et 7.5.5.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "App Connect Professional version 7.5.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Cast Iron version 7.5.1.0",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-5436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
},
{
"name": "CVE-2019-11598",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11598"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11470"
},
{
"name": "CVE-2019-3885",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3885"
},
{
"name": "CVE-2019-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10650"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2016-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2774"
},
{
"name": "CVE-2019-11472",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11472"
},
{
"name": "CVE-2018-16877",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16877"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2018-16878",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16878"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11599",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11599"
},
{
"name": "CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"name": "CVE-2019-3838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3838"
},
{
"name": "CVE-2019-11597",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11597"
},
{
"name": "CVE-2019-10131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10131"
},
{
"name": "CVE-2014-9709",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9709"
}
],
"initial_release_date": "2022-02-22T00:00:00",
"last_revision_date": "2022-02-22T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-168",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6558082 du 20 f\u00e9vrier 2022",
"url": "https://www.ibm.com/support/pages/node/6558082"
}
]
}
CERTFR-2019-AVI-503
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-15221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15221"
},
{
"name": "CVE-2019-15118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15118"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-15215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15215"
},
{
"name": "CVE-2019-15099",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15099"
},
{
"name": "CVE-2019-15030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15030"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-15292",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15292"
},
{
"name": "CVE-2019-15214",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15214"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-15212",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15212"
},
{
"name": "CVE-2019-15927",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15927"
},
{
"name": "CVE-2019-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14814"
},
{
"name": "CVE-2019-14815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14815"
},
{
"name": "CVE-2019-15924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15924"
},
{
"name": "CVE-2018-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-21008"
},
{
"name": "CVE-2019-15098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15098"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2018-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20976"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-15031",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15031"
},
{
"name": "CVE-2019-15219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15219"
},
{
"name": "CVE-2019-15211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15211"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-15290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15290"
},
{
"name": "CVE-2019-15920",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15920"
},
{
"name": "CVE-2019-15919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15919"
},
{
"name": "CVE-2019-15218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15218"
},
{
"name": "CVE-2019-15921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15921"
},
{
"name": "CVE-2019-15090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15090"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-15538",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15538"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"name": "CVE-2019-15222",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15222"
},
{
"name": "CVE-2019-15902",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15902"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-9456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9456"
},
{
"name": "CVE-2019-15666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2019-15117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15117"
},
{
"name": "CVE-2019-15216",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15216"
},
{
"name": "CVE-2019-15926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15926"
}
],
"initial_release_date": "2019-10-15T00:00:00",
"last_revision_date": "2019-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-503",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192651-1 du 14 octobre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192658-1 du 14 octobre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1/"
}
]
}
CERTFR-2019-AVI-429
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | CloudConnect 712 versions antérieures à V1.1.5 | ||
| Siemens | N/A | SIMATIC TDC CP51M1 versions antérieures à V1.1.7 | ||
| Siemens | N/A | Se référer au bulletins de l'éditeurs pour la liste complète des produits vulnérables, notamment le bulletin de sécurité SSA-187667 concernant les dernières vulnérabilités affectant les Remote Desktop Services de Microsoft (cf. https://www.cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-012/). | ||
| Siemens | N/A | SINEMA Remote Connect Server versions antérieures à V2.0 SP1 | ||
| Siemens | N/A | SINETPLAN versions V2.0 sans TIA Administrator V1.0 SP1 Upd1 | ||
| Siemens | N/A | SCALANCE SC-600 versions antérieures à V2.0.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CloudConnect 712 versions ant\u00e9rieures \u00e0 V1.1.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC TDC CP51M1 versions ant\u00e9rieures \u00e0 V1.1.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Se r\u00e9f\u00e9rer au bulletins de l\u0027\u00e9diteurs pour la liste compl\u00e8te des produits vuln\u00e9rables, notamment le bulletin de s\u00e9curit\u00e9 SSA-187667 concernant les derni\u00e8res vuln\u00e9rabilit\u00e9s affectant les Remote Desktop Services de Microsoft (cf. https://www.cert.ssi.gouv.fr/alerte/CERTFR-2019-ALE-012/).",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V2.0 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINETPLAN versions V2.0 sans TIA Administrator V1.0 SP1 Upd1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC-600 versions ant\u00e9rieures \u00e0 V2.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1182"
},
{
"name": "CVE-2019-10937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10937"
},
{
"name": "CVE-2019-12256",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12256"
},
{
"name": "CVE-2019-13920",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13920"
},
{
"name": "CVE-2019-12264",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12264"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-1222",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1222"
},
{
"name": "CVE-2019-12258",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12258"
},
{
"name": "CVE-2019-12259",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12259"
},
{
"name": "CVE-2019-12261",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12261"
},
{
"name": "CVE-2019-13922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13922"
},
{
"name": "CVE-2019-1226",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1226"
},
{
"name": "CVE-2019-13923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13923"
},
{
"name": "CVE-2019-10915",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10915"
},
{
"name": "CVE-2019-12263",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12263"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-12257",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12257"
},
{
"name": "CVE-2019-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1181"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-12260",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12260"
},
{
"name": "CVE-2019-12262",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12262"
},
{
"name": "CVE-2019-12255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12255"
},
{
"name": "CVE-2019-13918",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13918"
},
{
"name": "CVE-2019-13919",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13919"
},
{
"name": "CVE-2019-12265",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12265"
}
],
"initial_release_date": "2019-09-10T00:00:00",
"last_revision_date": "2019-09-10T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-429",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-250618 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-189842 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-187667 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-187667.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-884497 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-884497.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-834884 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-834884.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-191683 du 10 septembre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-191683.pdf"
}
]
}
CERTFR-2019-AVI-303
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | SD-WAN Edge by VeloCloud versions antérieures à 3.3.0 | ||
| VMware | N/A | Unified Access Gateway versions antérieures à 3.6 | ||
| VMware | N/A | SD-WAN Orchestrator by VeloCloud versions antérieures à 3.3.0 | ||
| VMware | vCenter Server | vCenter Server Appliance versions 6.5x antérieures à 6.5u3 | ||
| VMware | N/A | SD-WAN Gateway by VeloCloud versions antérieures à 3.3.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SD-WAN Edge by VeloCloud versions ant\u00e9rieures \u00e0 3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Unified Access Gateway versions ant\u00e9rieures \u00e0 3.6",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "SD-WAN Orchestrator by VeloCloud versions ant\u00e9rieures \u00e0 3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter Server Appliance versions 6.5x ant\u00e9rieures \u00e0 6.5u3",
"product": {
"name": "vCenter Server",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "SD-WAN Gateway by VeloCloud versions ant\u00e9rieures \u00e0 3.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-07-03T00:00:00",
"last_revision_date": "2019-07-03T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-303",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2019-0010 du 02 juillet 2019",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0010.html"
}
]
}
CERTFR-2019-AVI-442
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Citrix SD-WAN. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NetScaler SD-WAN versions ant\u00e9rieures \u00e0 10.0.8",
"product": {
"name": "NetScaler",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix SD-WAN versions ant\u00e9rieures \u00e0 10.2.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix SD-WAN versions ant\u00e9rieures \u00e0 11.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-09-12T00:00:00",
"last_revision_date": "2019-09-12T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-442",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Citrix SD-WAN.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix SD-WAN",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX256918 du 11 septembre 2019",
"url": "https://support.citrix.com/article/CTX256918"
}
]
}
CERTFR-2019-AVI-485
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar versions 5.5.x ant\u00e9rieures \u00e0 5.5.0.4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-10-08T00:00:00",
"last_revision_date": "2019-10-08T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-485",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 959523 du 07 octobre 2019",
"url": "https://www.ibm.com/support/pages/node/959523"
}
]
}
CERTFR-2019-AVI-561
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP1 | ||
| SUSE | N/A | SUSE Enterprise Storage 5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform 3.0 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-18509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2019-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16995"
},
{
"name": "CVE-2019-15221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15221"
},
{
"name": "CVE-2017-18379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18379"
},
{
"name": "CVE-2019-15118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15118"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-15215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15215"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16413",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16413"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-15214",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15214"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-15212",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15212"
},
{
"name": "CVE-2016-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10906"
},
{
"name": "CVE-2019-15927",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15927"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-18805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18805"
},
{
"name": "CVE-2019-13272",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13272"
},
{
"name": "CVE-2019-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14814"
},
{
"name": "CVE-2019-14815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14815"
},
{
"name": "CVE-2019-15924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15924"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-15098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15098"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2018-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20976"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-15219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15219"
},
{
"name": "CVE-2019-15211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15211"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-15290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15290"
},
{
"name": "CVE-2019-15218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15218"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"name": "CVE-2019-15902",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15902"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-9456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9456"
},
{
"name": "CVE-2019-15666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
},
{
"name": "CVE-2019-15216",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15216"
},
{
"name": "CVE-2019-15926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15926"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-201914218-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1/"
}
],
"reference": "CERTFR-2019-AVI-561",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
},
{
"description": "Nouveaux correctifs",
"revision_date": "2019-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192950-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192946-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192953-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-201914218-1 du 13 novembre 2019",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192952-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192949-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192951-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192948-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192947-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1/"
}
]
}
CERTFR-2019-AVI-309
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Citrix Hypervisor. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | Citrix Hypervisor | Citrix XenServer 7.6 | ||
| Citrix | Citrix Hypervisor | Citrix XenServer 7.1 | ||
| Citrix | Citrix Hypervisor | Citrix XenServer 7.0 | ||
| Citrix | Citrix Hypervisor | Citrix XenServer 8.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer 7.6",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 7.1",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 7.0",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 8.0",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-07-09T00:00:00",
"last_revision_date": "2019-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-309",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Citrix Hypervisor.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Citrix Hypervisor",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX256725 du 08 juillet 2019",
"url": "https://support.citrix.com/article/CTX256725"
}
]
}
CERTFR-2019-AVI-540
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur et une élévation de privilèges.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
}
],
"initial_release_date": "2019-10-31T00:00:00",
"last_revision_date": "2019-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-540",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-31T00:00:00.000000"
},
{
"description": "Ajout du bulletin du 31 octobre 2019",
"revision_date": "2019-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 31 octobre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192879-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 30 octobre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1/"
}
]
}
CERTFR-2019-AVI-281
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15-SP1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2018-16880",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16880"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10124"
},
{
"name": "CVE-2019-8564",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8564"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-11833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11833"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11811"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2019-11085",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11085"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-9003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9003"
},
{
"name": "CVE-2019-9500",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9500"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12818"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11815"
},
{
"name": "CVE-2014-9710",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9710"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-11486",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11486"
},
{
"name": "CVE-2019-3882",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3882"
},
{
"name": "CVE-2019-12819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12819"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
}
],
"initial_release_date": "2019-06-19T00:00:00",
"last_revision_date": "2019-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service \u00e0 distance\net une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2019:1550-1 du 18 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2019:14089-1 du 18 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1/"
}
]
}
CERTFR-2019-AVI-597
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Fortinet | FortiSwitch | FortiSwitch | ||
| Fortinet | N/A | FortiAP versions 6.2.x antérieures à 6.2.1 | ||
| Fortinet | N/A | FortiAP versions 6.0.x antérieures à 6.0.6 | ||
| Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.0.x antérieures à 6.0.7 | ||
| Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.2.x antérieures à 6.2.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "FortiSwitch",
"product": {
"name": "FortiSwitch",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAP versions 6.2.x ant\u00e9rieures \u00e0 6.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAP versions 6.0.x ant\u00e9rieures \u00e0 6.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAnalyzer versions 6.0.x ant\u00e9rieures \u00e0 6.0.7",
"product": {
"name": "FortiAnalyzer",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
},
{
"description": "FortiAnalyzer versions 6.2.x ant\u00e9rieures \u00e0 6.2.1",
"product": {
"name": "FortiAnalyzer",
"vendor": {
"name": "Fortinet",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-11-29T00:00:00",
"last_revision_date": "2019-11-29T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-597",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-180 du 29 November 2019",
"url": "https://fortiguard.com/psirt/FG-IR-19-180"
}
]
}
CERTFR-2019-AVI-279
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | N/A | SUSE CaaS Platpourm ALL | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platpourm 3.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Enterprise Storage 4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15-SP1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platpourm ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platpourm 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Open Buildservice Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10124"
},
{
"name": "CVE-2019-11833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11833"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2013-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4343"
},
{
"name": "CVE-2019-11085",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11085"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11815"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-11486",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11486"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
}
],
"initial_release_date": "2019-06-18T00:00:00",
"last_revision_date": "2019-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-279",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191527-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191536-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191535-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191532-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191530-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191534-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191529-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20191533-1 du 17 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1/"
}
]
}
CERTFR-2020-AVI-575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans plusieurs produits Aruba. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Contrôleurs et Passerelles utilisant x86 Mobility Master versions antérieures à 8.8.0.0 | ||
| HPE Aruba Networking | N/A | Aruba Instant (IAP) versions antérieures à 6.5.4.17, 8.3.0.13, 8.5.0.7, 8.6.0.0, 8.7.0.0 | ||
| HPE Aruba Networking | N/A | Switches CX Aruba versions antérieures à 10.3.0001 | ||
| HPE Aruba Networking | AirWave Management Platform | AirWave Management Platform versions antérieures à 8.2.10 | ||
| HPE Aruba Networking | N/A | Contrôleurs et Passerelles utilisant Aruba SD-WAN versions antérieures à 8.5.0.0-2.0.0.1, 8.5.0.0-2.1.0.0, 8.6.0.0-2.2.0.0 | ||
| HPE Aruba Networking | ClearPass Policy Manager | ClearPass Policy Manager versions antérieures à 6.7.13, 6.8.4, 6.9.0 | ||
| HPE Aruba Networking | N/A | Contrôleurs et Passerelles utilisant ArubaOS versions antérieures à 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10 | ||
| HPE Aruba Networking | N/A | Switches CX de séries 8400, 8325, 8320, 6400, 6300, 6200 utilisant ArubaOS versions antérieures à 10.05.0001 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Contr\u00f4leurs et Passerelles utilisant x86 Mobility Master versions ant\u00e9rieures \u00e0 8.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Aruba Instant (IAP) versions ant\u00e9rieures \u00e0 6.5.4.17, 8.3.0.13, 8.5.0.7, 8.6.0.0, 8.7.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "Switches CX Aruba versions ant\u00e9rieures \u00e0 10.3.0001",
"product": {
"name": "N/A",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "AirWave Management Platform versions ant\u00e9rieures \u00e0 8.2.10",
"product": {
"name": "AirWave Management Platform",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "Contr\u00f4leurs et Passerelles utilisant Aruba SD-WAN versions ant\u00e9rieures \u00e0 8.5.0.0-2.0.0.1, 8.5.0.0-2.1.0.0, 8.6.0.0-2.2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "ClearPass Policy Manager versions ant\u00e9rieures \u00e0 6.7.13, 6.8.4, 6.9.0",
"product": {
"name": "ClearPass Policy Manager",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "Contr\u00f4leurs et Passerelles utilisant ArubaOS versions ant\u00e9rieures \u00e0 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
},
{
"description": "Switches CX de s\u00e9ries 8400, 8325, 8320, 6400, 6300, 6200 utilisant ArubaOS versions ant\u00e9rieures \u00e0 10.05.0001",
"product": {
"name": "N/A",
"vendor": {
"name": "HPE Aruba Networking",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11478"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2020-7122",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7122"
},
{
"name": "CVE-2020-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11477"
},
{
"name": "CVE-2020-7121",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7121"
},
{
"name": "CVE-2020-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11479"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2020-09-16T00:00:00",
"last_revision_date": "2020-09-16T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-575",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans plusieurs produits\nAruba. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Aruba",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-009 du 15 septembre 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-009.txt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-010 du 15 septembre 2020",
"url": null
}
]
}
CERTFR-2019-AVI-298
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Traps versions antérieures à 5.0.5 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 8.0.x antérieures à 8.0.19 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions antérieures à 7.1.24 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 8.1.x antérieures à 8.1.8-h5 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.0.x antérieures à 9.0.2-h4 | ||
| Palo Alto Networks | N/A | MineMeld versions antérieures à 0.9.62 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Traps versions ant\u00e9rieures \u00e0 5.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "PAN-OS versions 8.0.x ant\u00e9rieures \u00e0 8.0.19",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions ant\u00e9rieures \u00e0 7.1.24",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 8.1.x ant\u00e9rieures \u00e0 8.1.8-h5",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.2-h4",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "MineMeld versions ant\u00e9rieures \u00e0 0.9.62",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1577"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-5599",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5599"
},
{
"name": "CVE-2019-1578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1578"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-06-28T00:00:00",
"last_revision_date": "2019-06-28T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-298",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de\ncode indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto 153 du 27 juin 2019",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/153"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto 151 du 27 juin 2019",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/151"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto 152 du 27 juin 2019",
"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/152"
}
]
}
CERTFR-2019-AVI-292
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11833"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2018-17972",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17972"
},
{
"name": "CVE-2019-11085",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11085"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
}
],
"initial_release_date": "2019-06-24T00:00:00",
"last_revision_date": "2019-06-25T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-292",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-24T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191692-1 du 24 juin 2019",
"revision_date": "2019-06-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191671-1 du 21 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191671-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191692-1 du 24 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191692-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191674-1 du 21 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191674-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20191668-1 du 21 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191668-1/"
}
]
}
CERTFR-2019-AVI-277
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian versions ant\u00e9rieures \u00e0 4.9.168-1+deb9u3",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11833"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-9500",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9500"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11815"
},
{
"name": "CVE-2019-11599",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11599"
},
{
"name": "CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"name": "CVE-2019-11486",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11486"
}
],
"initial_release_date": "2019-06-18T00:00:00",
"last_revision_date": "2019-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-277",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-4465-1 du 17 juin 2019",
"url": "https://www.debian.org/security/2019/dsa-4465"
}
]
}
CERTFR-2020-AVI-121
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 02 mars 2020",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-10623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10623"
},
{
"name": "CVE-2020-0047",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0047"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2019-10544",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10544"
},
{
"name": "CVE-2020-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0062"
},
{
"name": "CVE-2020-0044",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0044"
},
{
"name": "CVE-2020-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0055"
},
{
"name": "CVE-2019-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2311"
},
{
"name": "CVE-2020-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0045"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-10604",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10604"
},
{
"name": "CVE-2019-15215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15215"
},
{
"name": "CVE-2020-0041",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0041"
},
{
"name": "CVE-2019-17052",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17052"
},
{
"name": "CVE-2020-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0029"
},
{
"name": "CVE-2019-14083",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14083"
},
{
"name": "CVE-2020-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0059"
},
{
"name": "CVE-2020-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0010"
},
{
"name": "CVE-2020-0035",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0035"
},
{
"name": "CVE-2019-10591",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10591"
},
{
"name": "CVE-2019-14015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14015"
},
{
"name": "CVE-2019-10526",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10526"
},
{
"name": "CVE-2019-10552",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10552"
},
{
"name": "CVE-2019-10584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10584"
},
{
"name": "CVE-2019-14026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14026"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14061"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2019-2264",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2264"
},
{
"name": "CVE-2020-0032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0032"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-10593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10593"
},
{
"name": "CVE-2019-10577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10577"
},
{
"name": "CVE-2019-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2300"
},
{
"name": "CVE-2020-0058",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0058"
},
{
"name": "CVE-2020-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0054"
},
{
"name": "CVE-2019-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14027"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2019-10586",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10586"
},
{
"name": "CVE-2019-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2194"
},
{
"name": "CVE-2020-0034",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0034"
},
{
"name": "CVE-2019-14032",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14032"
},
{
"name": "CVE-2019-15212",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15212"
},
{
"name": "CVE-2020-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0051"
},
{
"name": "CVE-2020-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0012"
},
{
"name": "CVE-2019-14028",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14028"
},
{
"name": "CVE-2019-10549",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10549"
},
{
"name": "CVE-2019-14030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14030"
},
{
"name": "CVE-2019-14097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14097"
},
{
"name": "CVE-2020-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0060"
},
{
"name": "CVE-2019-14071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14071"
},
{
"name": "CVE-2020-0042",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0042"
},
{
"name": "CVE-2020-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0063"
},
{
"name": "CVE-2020-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0046"
},
{
"name": "CVE-2020-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0048"
},
{
"name": "CVE-2020-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0040"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-10550",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10550"
},
{
"name": "CVE-2020-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0083"
},
{
"name": "CVE-2019-14045",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14045"
},
{
"name": "CVE-2020-0038",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0038"
},
{
"name": "CVE-2019-13272",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13272"
},
{
"name": "CVE-2019-14082",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14082"
},
{
"name": "CVE-2019-10569",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10569"
},
{
"name": "CVE-2019-14072",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14072"
},
{
"name": "CVE-2018-11970",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11970"
},
{
"name": "CVE-2019-14815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14815"
},
{
"name": "CVE-2020-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0084"
},
{
"name": "CVE-2019-10616",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10616"
},
{
"name": "CVE-2019-10561",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10561"
},
{
"name": "CVE-2019-10587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10587"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2019-14000",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14000"
},
{
"name": "CVE-2019-14095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14095"
},
{
"name": "CVE-2019-14098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14098"
},
{
"name": "CVE-2019-10554",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10554"
},
{
"name": "CVE-2019-14068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14068"
},
{
"name": "CVE-2019-2317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2317"
},
{
"name": "CVE-2019-10546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10546"
},
{
"name": "CVE-2020-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0049"
},
{
"name": "CVE-2019-14079",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14079"
},
{
"name": "CVE-2019-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14031"
},
{
"name": "CVE-2020-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0050"
},
{
"name": "CVE-2019-14048",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14048"
},
{
"name": "CVE-2019-14029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14029"
},
{
"name": "CVE-2020-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0011"
},
{
"name": "CVE-2019-15211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15211"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-14085",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14085"
},
{
"name": "CVE-2019-19525",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19525"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-11838",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11838"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2020-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0031"
},
{
"name": "CVE-2020-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0066"
},
{
"name": "CVE-2020-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0033"
},
{
"name": "CVE-2020-0043",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0043"
},
{
"name": "CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"name": "CVE-2020-0039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0039"
},
{
"name": "CVE-2019-10594",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10594"
},
{
"name": "CVE-2020-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0053"
},
{
"name": "CVE-2020-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0037"
},
{
"name": "CVE-2019-10553",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10553"
},
{
"name": "CVE-2020-0036",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0036"
},
{
"name": "CVE-2019-15090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15090"
},
{
"name": "CVE-2020-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0061"
},
{
"name": "CVE-2019-14050",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14050"
},
{
"name": "CVE-2019-10612",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10612"
},
{
"name": "CVE-2019-14086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14086"
},
{
"name": "CVE-2020-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0056"
},
{
"name": "CVE-2020-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0087"
},
{
"name": "CVE-2019-10603",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10603"
},
{
"name": "CVE-2019-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13631"
},
{
"name": "CVE-2020-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0057"
},
{
"name": "CVE-2019-14081",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14081"
},
{
"name": "CVE-2020-0069",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0069"
},
{
"name": "CVE-2020-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0085"
},
{
"name": "CVE-2019-15666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
},
{
"name": "CVE-2019-10592",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10592"
},
{
"name": "CVE-2019-15117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15117"
},
{
"name": "CVE-2020-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0052"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-15926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15926"
}
],
"initial_release_date": "2020-03-03T00:00:00",
"last_revision_date": "2020-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-121",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 02 mars 2020",
"url": "https://source.android.com/security/bulletin/pixel/2020-03-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 02 mars 2020",
"url": "https://source.android.com/security/bulletin/2020-03-01"
}
]
}
CERTFR-2021-AVI-033
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks SRC Series versions antérieures à 4.12.0R6 | ||
| Juniper Networks | N/A | Juniper Networks Contrail Networking versions antérieures à 1911.31 | ||
| Juniper Networks | Junos OS Evolved | Juniper Junos OS Evolved versions antérieures à 19.3R2-S5-EVO, 19.4R2-S2-EVO, 20.1R1-S2-EVO, 20.1R1-S4-EVO, 20.1R2-S1-EVO, 20.2R1-EVO, 20.3R1-S1-EVO, 20.3R2-EVO et 20.4R1-EVO | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R12-S17, 12.3X48-D105, 14.1X53-D53, 15.1R7-S6, 15.1R7-S7, 15.1R7-S8, 15.1X49-D230, 15.1X49-D240, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.2R3-S3, 17.2R3-S4, 17.3R2-S5, 17.3R3-S10, 17.3R3-S7, 17.3R3-S8, 17.3R3-S9, 17.4R2-S11, 17.4R2-S12, 17.4R2-S9, 17.4R3, 17.4R3-S2, 17.4R3-S3, 17.4R3-S4, 18.1R3-S10, 18.1R3-S11, 18.1R3-S12, 18.1R3-S9, 18.2R2-S7, 18.2R2-S8, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2R3-S6, 18.2R3-S7, 18.2X75-D34, 18.3R2-S4, 18.3R3-S1, 18.3R3-S2, 18.3R3-S3, 18.3R3-S4, 18.4R1-S5, 18.4R1-S8, 18.4R2-S3, 18.4R2-S5, 18.4R2-S6, 18.4R2-S7, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3, 18.4R3-S4, 18.4R3-S5, 18.4R3-S6, 19.1R1-S4, 19.1R1-S5, 19.1R1-S6, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.1R3-S3, 19.2R1-S2, 19.2R1-S5, 19.2R1-S6, 19.2R2, 19.2R2-S1, 19.2R3, 19.2R3-S1, 19.3R2, 19.3R2-S1, 19.3R2-S3, 19.3R2-S4, 19.3R2-S5, 19.3R3, 19.3R3-S1, 19.4R1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R2-S1, 19.4R2-S2, 19.4R2-S3, 19.4R3, 19.4R3-S1, 20.1R1 , 20.1R1-S2, 20.1R1-S3, 20.1R1-S4, 20.1R2, 20.2R1, 20.2R1-S1, 20.2R1-S2, 20.2R1-S3, 20.2R2, 20.3R1, 20.3R1-S1, 20.3R2 et 20.4R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks SRC Series versions ant\u00e9rieures \u00e0 4.12.0R6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Contrail Networking versions ant\u00e9rieures \u00e0 1911.31",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS Evolved versions ant\u00e9rieures \u00e0 19.3R2-S5-EVO, 19.4R2-S2-EVO, 20.1R1-S2-EVO, 20.1R1-S4-EVO, 20.1R2-S1-EVO, 20.2R1-EVO, 20.3R1-S1-EVO, 20.3R2-EVO et 20.4R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S17, 12.3X48-D105, 14.1X53-D53, 15.1R7-S6, 15.1R7-S7, 15.1R7-S8, 15.1X49-D230, 15.1X49-D240, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.2R3-S3, 17.2R3-S4, 17.3R2-S5, 17.3R3-S10, 17.3R3-S7, 17.3R3-S8, 17.3R3-S9, 17.4R2-S11, 17.4R2-S12, 17.4R2-S9, 17.4R3, 17.4R3-S2, 17.4R3-S3, 17.4R3-S4, 18.1R3-S10, 18.1R3-S11, 18.1R3-S12, 18.1R3-S9, 18.2R2-S7, 18.2R2-S8, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2R3-S6, 18.2R3-S7, 18.2X75-D34, 18.3R2-S4, 18.3R3-S1, 18.3R3-S2, 18.3R3-S3, 18.3R3-S4, 18.4R1-S5, 18.4R1-S8, 18.4R2-S3, 18.4R2-S5, 18.4R2-S6, 18.4R2-S7, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3, 18.4R3-S4, 18.4R3-S5, 18.4R3-S6, 19.1R1-S4, 19.1R1-S5, 19.1R1-S6, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.1R3-S3, 19.2R1-S2, 19.2R1-S5, 19.2R1-S6, 19.2R2, 19.2R2-S1, 19.2R3, 19.2R3-S1, 19.3R2, 19.3R2-S1, 19.3R2-S3, 19.3R2-S4, 19.3R2-S5, 19.3R3, 19.3R3-S1, 19.4R1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R2-S1, 19.4R2-S2, 19.4R2-S3, 19.4R3, 19.4R3-S1, 20.1R1 , 20.1R1-S2, 20.1R1-S3, 20.1R1-S4, 20.1R2, 20.2R1, 20.2R1-S1, 20.2R1-S2, 20.2R1-S3, 20.2R2, 20.3R1, 20.3R1-S1, 20.3R2 et 20.4R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0207"
},
{
"name": "CVE-2021-0222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0222"
},
{
"name": "CVE-2018-20997",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20997"
},
{
"name": "CVE-2010-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0742"
},
{
"name": "CVE-2013-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1741"
},
{
"name": "CVE-2021-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0206"
},
{
"name": "CVE-2010-4252",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4252"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2021-0202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0202"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2013-5607",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5607"
},
{
"name": "CVE-2021-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0211"
},
{
"name": "CVE-2014-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3567"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2021-0203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0203"
},
{
"name": "CVE-2021-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0205"
},
{
"name": "CVE-2009-3245",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3245"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0209"
},
{
"name": "CVE-2014-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8176"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2011-4109",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4109"
},
{
"name": "CVE-2010-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3864"
},
{
"name": "CVE-2021-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0208"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2021-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0212"
},
{
"name": "CVE-2020-8616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8616"
},
{
"name": "CVE-2021-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0210"
},
{
"name": "CVE-2014-1545",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1545"
}
],
"initial_release_date": "2021-01-14T00:00:00",
"last_revision_date": "2021-01-14T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-033",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11096 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11096\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11098 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11098\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11097 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11097\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11094 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11094\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11104 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11104\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11099 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11099\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11093 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11093\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11101 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11101\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11088 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11088\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11092 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11092\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11091 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11091\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11100 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11100\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11095 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11095\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11090 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11090\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11102 du 13 janvier 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11102\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2020-AVI-645
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS NFX Series versions antérieures à 20.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S16, 12.3X48-D105, 14.1X53-D53, 15.1R7-S8, 15.1X49-D220, 15.1X53-D593, 16.1R7-S8, 16.2R2-S11, 17.1R2-S11, 17.2R3-S4, 17.2X75-D45, 17.3R3-S9, 17.4R2-S12, 17.4R3-S3, 18.1R3-S10, 18.2R2-S7, 18.2R3S6, 18.2X75-D435, 18.3R1-S7, 18.3R2-S4, 18.3R3-S3, 18.4R1-S7, 18.4R2-S5, 18.4R3-S4, 19.1R1-S5, 19.1R2-S2, 19.1R3-S2, 19.2R1-S5, 19.2R2, 19.3R2-S3, 19.3R3, 19.4R1-S3, 19.4R2-S1, 19.4R3, 20.1R1-S2, 20.1R2, 20.2R1 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.4.0 | ||
| Juniper Networks | N/A | Juniper Networks Junos Space et Junos Space Security Director versions antérieures à 20.2R1 | ||
| Juniper Networks | Junos OS | Junos OS MX series et EX9200 Series versions antérieures à 17.2R3-S4, 17.2X75-D102, 17.2X75-D110, 17.3R3-S8, 17.4R2-S11, 17.4R3-S2, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2X75-D30, 18.3R2-S4, 18.3R3-S2 | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 20.1R2-EVO | ||
| Juniper Networks | Junos OS | Junos OS NFX150, SRX1500, SRX4100, SRX4200, vSRX versions antérieures à 15.1X49-D220, 17.4R3-S3, 18.1R3-S11, 18.2R3-S5, 18.3R2-S4, 18.3R3-S3, 18.4R2-S5, 18.4R3-S4, 19.1R3-S2, 19.2R1-S5, 19.2R3 | ||
| Juniper Networks | Junos OS | Junos OS SRX Series versions antérieures à 12.3X48-D90, 15.1X49-D190, 17.4R2-S9, 17.4R3, 18.1R3-S9, 18.2R3, 18.3R1-S7, 18.3R2-S3, 18.3R3, 18.4R1-S6, 18.4R2-S3, 18.4R3, 19.1R1-S4, 19.1R2 | ||
| Juniper Networks | Junos OS | Junos OS MX Series versions antérieures à 17.3R3-S8, 18.3R3-S1, 18.4R3, 19.1R3, 19.2R2, 19.3R3 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS NFX Series versions ant\u00e9rieures \u00e0 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S16, 12.3X48-D105, 14.1X53-D53, 15.1R7-S8, 15.1X49-D220, 15.1X53-D593, 16.1R7-S8, 16.2R2-S11, 17.1R2-S11, 17.2R3-S4, 17.2X75-D45, 17.3R3-S9, 17.4R2-S12, 17.4R3-S3, 18.1R3-S10, 18.2R2-S7, 18.2R3S6, 18.2X75-D435, 18.3R1-S7, 18.3R2-S4, 18.3R3-S3, 18.4R1-S7, 18.4R2-S5, 18.4R3-S4, 19.1R1-S5, 19.1R2-S2, 19.1R3-S2, 19.2R1-S5, 19.2R2, 19.3R2-S3, 19.3R3, 19.4R1-S3, 19.4R2-S1, 19.4R3, 20.1R1-S2, 20.1R2, 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.4.0",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos Space et Junos Space Security Director versions ant\u00e9rieures \u00e0 20.2R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS MX series et EX9200 Series versions ant\u00e9rieures \u00e0 17.2R3-S4, 17.2X75-D102, 17.2X75-D110, 17.3R3-S8, 17.4R2-S11, 17.4R3-S2, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2X75-D30, 18.3R2-S4, 18.3R3-S2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 20.1R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS NFX150, SRX1500, SRX4100, SRX4200, vSRX versions ant\u00e9rieures \u00e0 15.1X49-D220, 17.4R3-S3, 18.1R3-S11, 18.2R3-S5, 18.3R2-S4, 18.3R3-S3, 18.4R2-S5, 18.4R3-S4, 19.1R3-S2, 19.2R1-S5, 19.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS SRX Series versions ant\u00e9rieures \u00e0 12.3X48-D90, 15.1X49-D190, 17.4R2-S9, 17.4R3, 18.1R3-S9, 18.2R3, 18.3R1-S7, 18.3R2-S3, 18.3R3, 18.4R1-S6, 18.4R2-S3, 18.4R3, 19.1R1-S4, 19.1R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS MX Series versions ant\u00e9rieures \u00e0 17.3R3-S8, 18.3R3-S1, 18.4R3, 19.1R3, 19.2R2, 19.3R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1661"
},
{
"name": "CVE-2020-7450",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7450"
},
{
"name": "CVE-2015-3416",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3416"
},
{
"name": "CVE-2019-15875",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15875"
},
{
"name": "CVE-2015-3415",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3415"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2008-6592",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6592"
},
{
"name": "CVE-2019-9936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
},
{
"name": "CVE-2020-1657",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1657"
},
{
"name": "CVE-2020-1682",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1682"
},
{
"name": "CVE-2019-5599",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5599"
},
{
"name": "CVE-2013-7443",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7443"
},
{
"name": "CVE-2018-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8740"
},
{
"name": "CVE-2015-6607",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6607"
},
{
"name": "CVE-2018-20506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20506"
},
{
"name": "CVE-2018-20346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20346"
},
{
"name": "CVE-2015-5895",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5895"
},
{
"name": "CVE-2015-3414",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3414"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2020-10188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10188"
},
{
"name": "CVE-2019-8457",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
},
{
"name": "CVE-2017-13685",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13685"
},
{
"name": "CVE-2019-5018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5018"
},
{
"name": "CVE-2008-6589",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6589"
},
{
"name": "CVE-2020-1656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1656"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2020-1665",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1665"
},
{
"name": "CVE-2016-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6153"
},
{
"name": "CVE-2015-3717",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3717"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2017-15286",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15286"
},
{
"name": "CVE-2020-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1660"
},
{
"name": "CVE-2019-6593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6593"
},
{
"name": "CVE-2008-6593",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6593"
},
{
"name": "CVE-2019-16168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
},
{
"name": "CVE-2008-6590",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6590"
},
{
"name": "CVE-2019-5610",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5610"
},
{
"name": "CVE-2019-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
},
{
"name": "CVE-2017-10989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10989"
},
{
"name": "CVE-2020-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1662"
},
{
"name": "CVE-2018-20505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20505"
}
],
"initial_release_date": "2020-10-15T00:00:00",
"last_revision_date": "2020-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-645",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11055 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11055\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11050 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11050\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11079 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11079\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11053 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11053\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11059 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11059\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11049 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11049\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11046 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11046\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11048 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11048\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11057 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11057\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11054 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11054\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11062 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11062\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11056 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11056\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11045 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11045\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11058 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11058\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11047 du 14 octobre 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11047\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-276
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 19.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
}
],
"initial_release_date": "2019-06-18T00:00:00",
"last_revision_date": "2019-06-18T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-276",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4017-2 du 17 juin 2019",
"url": "https://usn.ubuntu.com/4017-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4017-1 du 17 juin 2019",
"url": "https://usn.ubuntu.com/4017-1/"
}
]
}
CERTFR-2020-AVI-665
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de sécurité | ||
| Oracle | Systems | Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP2362 | ||
| Oracle | Systems | Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware antérieur à XCP3090 | ||
| Oracle | N/A | Oracle Solaris versions 10 et 11 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle ZFS Storage Appliance kit version 8.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP2362",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Serveurs Fujitsu M10-1, M10-4, M10-4S, M12-1, M12-2, M12-2S de Oracle Systems de firmware ant\u00e9rieur \u00e0 XCP3090",
"product": {
"name": "Systems",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et 11 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-14759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14759"
},
{
"name": "CVE-2020-3909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3909"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-14758",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14758"
},
{
"name": "CVE-2020-14754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14754"
},
{
"name": "CVE-2020-14871",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14871"
},
{
"name": "CVE-2020-14818",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14818"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
}
],
"initial_release_date": "2020-10-21T00:00:00",
"last_revision_date": "2020-10-21T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpuoct2020 du 20 octobre 2020",
"url": "https://www.oracle.com/security-alerts/cpuoct2020verbose.html"
}
]
}
CERTFR-2019-AVI-286
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-11085",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11085"
},
{
"name": "CVE-2019-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3846"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
}
],
"initial_release_date": "2019-06-21T00:00:00",
"last_revision_date": "2019-06-21T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-286",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-06-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2019:1588-1 du 20 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2019:1581-1 du 20 juin 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1/"
}
]
}
CERTFR-2022-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Système affecté | Lien vers l'avis éditeur |
|---|---|
| Advantage Navigator Energy & Sustainability | Lien |
| Advantage Navigator Software Proxy V6 | Lien |
| Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
| Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
| Building Twin - 360° Viewer | Lien |
| Capital | Lien |
| Cerberus DMS | Lien |
| CloudConnect 712 | Lien |
| COMOS | Lien |
| COMOS V10.2 | Lien |
| COMOS V10.3 | Lien |
| COMOS V10.4 | Lien |
| cRSP Operator Client Starter | Lien |
| cRSP | Lien |
| Desigo CC | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
| E-Car OC Cloud Application | Lien |
| Energy Engage | Lien |
| EnergyIP Prepay V3.7 | Lien |
| EnergyIP Prepay V3.8 | Lien |
| EnergyIP | Lien |
| Enlighted Amaze | Lien |
| Enlighted Where | Lien |
| Geolus Shape Search V10 | Lien |
| Geolus Shape Search V11 | Lien |
| GMA-Manager | Lien |
| HEEDS Connect | Lien |
| HES UDIS | Lien |
| IE/AS-i Link PN IO | Lien |
| IE/PB-Link (incl. SIPLUS NET variants) | Lien |
| IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
| Industrial Edge Hub | Lien |
| Industrial Edge Management App (IEM-App) | Lien |
| Industrial Edge Management OS (IEM-OS) | Lien |
| jROS for Spectrum Power 4 | Lien |
| jROS for Spectrum Power 7 | Lien |
| JT2Go | Lien |
| KTK ATE530S | Lien |
| LOGO! CMR2020 | Lien |
| LOGO! CMR2040 | Lien |
| Mendix Applications | Lien |
| MindSphere App Management Cockpits (Developer& Operator) | Lien |
| MindSphere Asset Manager | Lien |
| Mindsphere Cloud Foundry | Lien |
| Mindsphere Cloud Platform | Lien |
| MindSphere IAM (User Management/ Settings) | Lien |
| MindSphere Integrated Data Lake | Lien |
| MindSphere Notification Service | Lien |
| MindSphere Predictive Learning | Lien |
| MindSphere Usage Transparency Service | Lien |
| MindSphere Visual Explorer | Lien |
| NXpower Monitor | Lien |
| NX | Lien |
| Opcenter EX CP Process Automation Control | Lien |
| Opcenter Execution Core Process Automation Control | Lien |
| Opcenter Intelligence | Lien |
| Operation Scheduler | Lien |
| PROFINET Driver for Controller | Lien |
| PSS(R)CAPE | Lien |
| RFID 181EIP | Lien |
| ROX II | Lien |
| RUGGEDCOM APE1404 Linux | Lien |
| RUGGEDCOM CROSSBOW Station Access Controller | Lien |
| RUGGEDCOM RCM1224 | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) EU | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM RM1224 | Lien |
| RUGGEDCOM ROX MX5000RE | Lien |
| RUGGEDCOM ROX MX5000 | Lien |
| RUGGEDCOM ROX RX1400 | Lien |
| RUGGEDCOM ROX RX1500 | Lien |
| RUGGEDCOM ROX RX1501 | Lien |
| RUGGEDCOM ROX RX1510 | Lien |
| RUGGEDCOM ROX RX1511 | Lien |
| RUGGEDCOM ROX RX1512 | Lien |
| RUGGEDCOM ROX RX1524 | Lien |
| RUGGEDCOM ROX RX1536 | Lien |
| RUGGEDCOM ROX RX5000 | Lien |
| RUGGEDCOM RX1400 VPE Debian Linux | Lien |
| RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
| SCALANCE LPE9403 | Lien |
| SCALANCE M-800 / S615 | Lien |
| SCALANCE M-800 | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M804PB | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M812-1 ADSL-Router | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
| SCALANCE M816-1 ADSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M826-2 SHDSL-Router | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-2 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M874-3 | Lien |
| SCALANCE M875 | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 (ROK) | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-3 | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (EU) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE M876-4 (NAM) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (EU) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE MUM856-1 (RoW) | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S602 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S612 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S615 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S623 | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE S627-2M | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC622-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC632-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC636-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC642-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE SC646-2C | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W-1700 IEEE 802.11ac family | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1748-1 M12 | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1750D | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-1 M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2 EEC M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2IA M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W1788-2 M12 | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W-700 IEEE 802.11n family | Lien |
| SCALANCE W700 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W721-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W722-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W734-1 RJ45 (USA) | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W738-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 M12 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W748-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W761-1 RJ45 | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 M12 EEC | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W774-1 RJ45 (USA) | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 EEC (USA) | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W778-1 M12 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-1 RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2IA RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 RJ45 | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W786-2 SFP | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 M12 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-1 RJ45 | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 EEC | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 M12 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE W788-2 RJ45 | Lien |
| SCALANCE WAM763-1 | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC 6GHz | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 EEC | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WAM766-1 | Lien |
| SCALANCE WLC711 | Lien |
| SCALANCE WLC712 | Lien |
| SCALANCE WUM763-1 | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 6GHz | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE WUM766-1 | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X200-4 P IRT | Lien |
| SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT PRO | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X201-3P IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2 IRT | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X202-2P IRT PRO | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2FM | Lien |
| SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X204-2LD | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2LD TS | Lien |
| SCALANCE X204-2 | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204-2TS | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT PRO | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204 IRT | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP/HSR) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA EEC (PRP) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (HSR) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X204RNA (PRP) | Lien |
| SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
| SCALANCE X206-1LD | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X206-1 | Lien |
| SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208PRO | Lien |
| SCALANCE X208 | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2LD | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X212-2 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X216 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X224 | Lien |
| SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
| SCALANCE X302-7 EEC (230V coated) | Lien |
| SCALANCE X302-7 EEC (230V) | Lien |
| SCALANCE X302-7 EEC (24V coated) | Lien |
| SCALANCE X302-7 EEC (24V) | Lien |
| SCALANCE X302-7 EEC (2x 230V coated) | Lien |
| SCALANCE X302-7 EEC (2x 230V) | Lien |
| SCALANCE X302-7 EEC (2x 24V coated) | Lien |
| SCALANCE X302-7 EEC (2x 24V) | Lien |
| SCALANCE X302-7EEC | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X304-2FE | Lien |
| SCALANCE X306-1LD FE | Lien |
| SCALANCE X306-1LDFE | Lien |
| SCALANCE X307-2 EEC (230V coated) | Lien |
| SCALANCE X307-2 EEC (230V) | Lien |
| SCALANCE X307-2 EEC (24V coated) | Lien |
| SCALANCE X307-2 EEC (24V) | Lien |
| SCALANCE X307-2 EEC (2x 230V coated) | Lien |
| SCALANCE X307-2 EEC (2x 230V) | Lien |
| SCALANCE X307-2 EEC (2x 24V coated) | Lien |
| SCALANCE X307-2 EEC (2x 24V) | Lien |
| SCALANCE X307-2EEC | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3LD | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X307-3 | Lien |
| SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LD | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2LH+ | Lien |
| SCALANCE X308-2LH | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M PoE | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2M TS | Lien |
| SCALANCE X308-2 | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310FE | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X310 | Lien |
| SCALANCE X320-1-2LD FE | Lien |
| SCALANCE X320-1 FE | Lien |
| SCALANCE X320-1FE | Lien |
| SCALANCE X320-3LDFE | Lien |
| SCALANCE X408-2 | Lien |
| SCALANCE X408 | Lien |
| SCALANCE X414 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XB-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XC-200 | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF-200BA | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF201-3P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF202-2P IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2BA IRT | Lien |
| SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
| SCALANCE XF204-2 | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 IRT | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF204 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF206-1 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XF208 | Lien |
| SCALANCE XM-400 Family | Lien |
| SCALANCE XM400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XM-400 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XP-200 | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR-300WG | Lien |
| SCALANCE XR324-12M (230V ports on front) | Lien |
| SCALANCE XR324-12M (230V ports on rear) | Lien |
| SCALANCE XR324-12M (24V ports on front) | Lien |
| SCALANCE XR324-12M (24V ports on rear) | Lien |
| SCALANCE XR324-12M | Lien |
| SCALANCE XR324-12M TS (24V) | Lien |
| SCALANCE XR324-12M TS | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC (24V ports on front) | Lien |
| SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
| SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
| SCALANCE XR324-4M EEC | Lien |
| SCALANCE XR324-4M PoE | Lien |
| SCALANCE XR324-4M PoE TS | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR-500 Family | Lien |
| SCALANCE XR500 | Lien |
| SCALANCE XR-500 | Lien |
| SENTRON 3VA COM100/800 | Lien |
| SENTRON 3VA DSP800 | Lien |
| SENTRON PAC2200 (with CLP Approval) | Lien |
| SENTRON PAC2200 (with MID Approval) | Lien |
| SENTRON PAC2200 (without MID Approval) | Lien |
| SENTRON PAC3200 | Lien |
| SENTRON PAC3200T | Lien |
| SENTRON PAC3220 | Lien |
| SENTRON PAC4200 | Lien |
| SENTRON powermanager V4 | Lien |
| SICAM 230 | Lien |
| SICAM TOOLBOX II | Lien |
| SIDOOR ATD430W | Lien |
| SIDOOR ATE530S COATED | Lien |
| SIDOOR ATE531S | Lien |
| SIGUARD DSA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC CFU PA | Lien |
| SIMATIC Cloud Connect 7 CC712 | Lien |
| SIMATIC Cloud Connect 7 CC716 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542-1 | Lien |
| SIMATIC CM 1542SP-1 | Lien |
| SIMATIC Compact Field Unit | Lien |
| SIMATIC CP 1242-7C | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1242-7 GPRS V2 | Lien |
| SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-1 | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE EU | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-7 LTE US | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1243-8 IRC | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1542SP-1 IRC | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1542SP-1 | Lien |
| SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543-1 | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1543SP-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1545-1 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1604 | Lien |
| SIMATIC CP 1616 and CP 1604 | Lien |
| SIMATIC CP1616/CP1604 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1616 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP 1623 | Lien |
| SIMATIC CP1626 | Lien |
| SIMATIC CP 1626 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 1628 | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 Advanced | Lien |
| SIMATIC CP 343-1 ERPC | Lien |
| SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
| SIMATIC CP 343-1 Lean | Lien |
| SIMATIC CP 343-1 | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 442-1 RNA | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 Advanced | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 OPC UA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 RNA | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC CP 443-1 | Lien |
| SIMATIC DK-16xx PN IO | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC Drive Controller family | Lien |
| SIMATIC ET200AL IM 157-1 PN | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200AL | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200ecoPN: IO-Link Master | Lien |
| SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200M (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200pro IM 154-3 PN HF | Lien |
| SIMATIC ET200pro IM 154-4 PN HF | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200pro | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200S (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 MF HF | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
| SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
| SIMATIC Field PG M5 | Lien |
| SIMATIC Field PG M6 | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
| SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC HMI KTP Mobile Panels | Lien |
| SIMATIC IE/PB-LINK V3 | Lien |
| SIMATIC Information Server | Lien |
| SIMATIC IPC1047E | Lien |
| SIMATIC IPC1047 | Lien |
| SIMATIC IPC127E | Lien |
| SIMATIC IPC427E | Lien |
| SIMATIC IPC477E Pro | Lien |
| SIMATIC IPC477E | Lien |
| SIMATIC IPC527G | Lien |
| SIMATIC IPC547G | Lien |
| SIMATIC IPC627E | Lien |
| SIMATIC IPC647D | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC647E | Lien |
| SIMATIC IPC677E | Lien |
| SIMATIC IPC847D | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC847E | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC DiagMonitor | Lien |
| SIMATIC IPC Support Package for VxWorks | Lien |
| SIMATIC ITC1500 PRO | Lien |
| SIMATIC ITC1500 | Lien |
| SIMATIC ITC1900 PRO | Lien |
| SIMATIC ITC1900 | Lien |
| SIMATIC ITC2200 PRO | Lien |
| SIMATIC ITC2200 | Lien |
| SIMATIC ITP1000 | Lien |
| SIMATIC Logon | Lien |
| SIMATIC MICRO-DRIVE PDC | Lien |
| SIMATIC MV400 family | Lien |
| SIMATIC MV400 | Lien |
| SIMATIC MV540 H (6GF3540-0GE10) | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 H | Lien |
| SIMATIC MV540 S (6GF3540-0CD10) | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV540 S | Lien |
| SIMATIC MV550 H (6GF3550-0GE10) | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 H | Lien |
| SIMATIC MV550 S (6GF3550-0CD10) | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV550 S | Lien |
| SIMATIC MV560 U (6GF3560-0LE10) | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 U | Lien |
| SIMATIC MV560 X (6GF3560-0HE10) | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC MV560 X | Lien |
| SIMATIC NET CP 1604 | Lien |
| SIMATIC NET CP 1616 | Lien |
| SIMATIC NET DK-16xx PN IO | Lien |
| SIMATIC NET PC Software | Lien |
| SIMATIC PCS 7 TeleControl | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V8.2 and earlier | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.0 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS 7 V9.1 | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PCS neo | Lien |
| SIMATIC PDM | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
| SIMATIC Power Line Booster PLB Base Module | Lien |
| SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC Process Historian OPC UA Server | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC PROFINET Driver | Lien |
| SIMATIC RF166C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF180C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF182C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF185C | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186CI | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF186C | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188CI | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF188C | Lien |
| SIMATIC RF360R | Lien |
| SIMATIC RF600 family | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600R | Lien |
| SIMATIC RF600 | Lien |
| SIMATIC RF650R | Lien |
| SIMATIC RF680R | Lien |
| SIMATIC RF685R | Lien |
| SIMATIC RTU3010C | Lien |
| SIMATIC RTU3030C | Lien |
| SIMATIC RTU3031C | Lien |
| SIMATIC RTU3041C | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-1500 Software Controller (incl. F) | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-1500 Software Controller | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-200 SMART | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC S7-PLCSIM Advanced | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CP51M1 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC TDC CPU555 | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Advanced | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Basic | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC Teleservice Adapter IE Standard | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinAC RTX (F) 2010 | Lien |
| SIMATIC WinCC OA | Lien |
| SIMATIC WinCC OA V3.17 | Lien |
| SIMATIC WinCC OA V3.18 | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC Runtime Advanced | Lien |
| SIMATIC WinCC TeleControl | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V15 and earlier | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V16 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V17 | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.4 and earlier | Lien |
| SIMATIC WinCC V7.5 | Lien |
| SIMATIC WinCC V7.5 | Lien |
| Simcenter 3D | Lien |
| Simcenter Amesim | Lien |
| Simcenter Femap V2020.2 | Lien |
| Simcenter Femap V2021.1 | Lien |
| Simcenter System Architect | Lien |
| Simcenter System Simulation Client for Git | Lien |
| Simcenter Testlab Data Management | Lien |
| Simcenter Testlab | Lien |
| SIMIT Simulation Platform | Lien |
| SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
| SIMOCODE proV Ethernet/IP | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
| SIMOCODE proV PROFINET | Lien |
| SIMOTION C | Lien |
| SIMOTION C | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION D (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION (incl. SIPLUS variants) | Lien |
| SIMOTION P | Lien |
| SIMOTION P V4.4 and V4.5 | Lien |
| SIMOTION P V5 | Lien |
| SINAMICS Connect 300 | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCM w. PN | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS DCP w. PN | Lien |
| SINAMICS G110M V4.7 Control Unit | Lien |
| SINAMICS G110M V4.7 PN Control Unit | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G110M w. PN | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS G130 V4.6 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 Control Unit | Lien |
| SINAMICS G130 V4.7 SP1 Control Unit | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.7 w. PN | Lien |
| SINAMICS G130 V4.8 Control Unit | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V4.8 w. PN | Lien |
| SINAMICS G130 V5.1 Control Unit | Lien |
| SINAMICS G130 V5.1 SP1 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 Control Unit | Lien |
| SINAMICS G150 V4.6 Control Unit | Lien |
| SINAMICS G150 V4.7 Control Unit | Lien |
| SINAMICS G150 V4.7 SP1 Control Unit | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.7 w. PN | Lien |
| SINAMICS G150 V4.8 Control Unit | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V4.8 w. PN | Lien |
| SINAMICS G150 V5.1 Control Unit | Lien |
| SINAMICS G150 V5.1 SP1 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GH150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GL150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS GM150 V4.7 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 Control Unit | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S110 w. PN | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 Control Unit | Lien |
| SINAMICS S150 V4.6 Control Unit | Lien |
| SINAMICS S150 V4.7 Control Unit | Lien |
| SINAMICS S150 V4.7 SP1 Control Unit | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.7 w. PN | Lien |
| SINAMICS S150 V4.8 Control Unit | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V4.8 w. PN | Lien |
| SINAMICS S150 V5.1 Control Unit | Lien |
| SINAMICS S150 V5.1 SP1 Control Unit | Lien |
| SINAMICS S210 V5.1 Control Unit | Lien |
| SINAMICS S210 V5.1 SP1 Control Unit | Lien |
| SINAMICS S/G Control Unit w. PROFINET | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SL150 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS SM120 V4.7 Control Unit | Lien |
| SINAMICS V90 w. PN | Lien |
| SINAMICS V90 w. PN | Lien |
| SINEC INS | Lien |
| SINEC NMS | Lien |
| SINEC-NMS | Lien |
| SINEC NMS | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Remote Connect Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server | Lien |
| SINEMA Server V14 | Lien |
| SINUMERIK 808D | Lien |
| SINUMERIK 828D HW PU.4 | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D | Lien |
| SINUMERIK 828D V4.5 and prior | Lien |
| SINUMERIK 828D V4.7 | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl | Lien |
| SINUMERIK 840D sl V4.5 and prior | Lien |
| SINUMERIK 840D sl V4.7 | Lien |
| SINUMERIK MC MCU 1720 | Lien |
| SINUMERIK ONE NCU 1740 | Lien |
| SINUMERIK ONE PPU 1740 | Lien |
| SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK OPC UA Server | Lien |
| SINUMERIK Operate | Lien |
| SiPass integrated V2.80 | Lien |
| SiPass integrated V2.85 | Lien |
| SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 1543-1 | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Advanced | Lien |
| SIPLUS NET CP 343-1 Lean | Lien |
| SIPLUS NET CP 343-1 | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 Advanced | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS NET CP 443-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS S7-1200 CP 1243-1 | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIPLUS TIM 1531 IRC | Lien |
| SIRIUS ACT 3SU1 interface module PROFINET | Lien |
| SIRIUS Motor Starter M200D PROFINET | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SIRIUS Soft Starter 3RW44 PN | Lien |
| SITOP Manager | Lien |
| SITOP PSU8600 PROFINET | Lien |
| SITOP PSU8600 | Lien |
| SITOP UPS1600 (incl. SIPLUS variants) | Lien |
| SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
| Siveillance Command | Lien |
| Siveillance Control Pro | Lien |
| Siveillance Identity V1.5 | Lien |
| Siveillance Identity V1.6 | Lien |
| Siveillance Vantage | Lien |
| SOFTNET-IE PNIO | Lien |
| SOFTNET-IE PNIO | Lien |
| Softnet PROFINET IO for PC-based Windows systems | Lien |
| Solid Edge CAM Pro | Lien |
| Solid Edge Harness Design | Lien |
| Solid Edge SE2021 | Lien |
| Solid Edge SE2022 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 4 | Lien |
| Spectrum Power 7 | Lien |
| SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
| Teamcenter Active Workspace | Lien |
| Teamcenter Briefcase Browser | Lien |
| Teamcenter Data Share Manager | Lien |
| Teamcenter Deployment Center | Lien |
| Teamcenter Dispatcher Service | Lien |
| Teamcenter EDA | Lien |
| Teamcenter FMS | Lien |
| Teamcenter Integration for CATIA | Lien |
| Teamcenter Integration Framework | Lien |
| Teamcenter MBSE Gateway | Lien |
| Teamcenter Mendix Connector | Lien |
| Teamcenter Microservices Framework | Lien |
| Teamcenter Polarion Integration | Lien |
| Teamcenter Rapid Start | Lien |
| Teamcenter Reporting and Analytics V11 | Lien |
| Teamcenter Reporting and Analytics V12.2 | Lien |
| Teamcenter Reporting and Analytics V12.3 | Lien |
| Teamcenter Reporting and Analytics V12.4 | Lien |
| Teamcenter Reporting and Analytics V13 | Lien |
| Teamcenter Retail Footwear and Apparel | Lien |
| Teamcenter Security Services | Lien |
| Teamcenter Supplier Collaboration | Lien |
| Teamcenter System Modeling Workbench | Lien |
| Teamcenter | Lien |
| Teamcenter Technical Publishing | Lien |
| Teamcenter Visualization V12.4 | Lien |
| Teamcenter Visualization V13.1 | Lien |
| Teamcenter Visualization V13.2 | Lien |
| Teamcenter Visualization V13.3 | Lien |
| Tecnomatix eBOP Manager Server | Lien |
| Tecnomatix Intosite | Lien |
| Tecnomatix Plant Simulation | Lien |
| Tecnomatix Process Designer | Lien |
| Tecnomatix Process Simulate | Lien |
| Tecnomatix Process Simulate VCLite | Lien |
| Tecnomatix RobotExpert | Lien |
| TeleControl Server Basic | Lien |
| TIA Administrator | Lien |
| TIA Administrator | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
| TIM 1531 IRC | Lien |
| TIM 1531 IRC | Lien |
| TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
| TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
| Valor Parts Library - VPL Direct | Lien |
| Valor Parts Library - VPL Server or Service | Lien |
| VeSys | Lien |
| Xpedition Enterprise VX.2.10 | Lien |
| Xpedition Enterprise VX.2.6 | Lien |
| Xpedition Enterprise VX.2.7 | Lien |
| Xpedition Enterprise VX.2.8 | Lien |
| Xpedition Enterprise (XCR) VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.10 | Lien |
| Xpedition IC Packaging VX.2.6 | Lien |
| Xpedition IC Packaging VX.2.7 | Lien |
| Xpedition IC Packaging VX.2.8 | Lien |
| Xpedition IC Packaging (XCR) VX.2.10 | Lien |
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40360"
},
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2021-37186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37186"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2016-4956",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4956"
},
{
"name": "CVE-2021-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37198"
},
{
"name": "CVE-2016-4953",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4953"
},
{
"name": "CVE-2021-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40363"
},
{
"name": "CVE-2021-46151",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46151"
},
{
"name": "CVE-2021-44018",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44018"
},
{
"name": "CVE-2022-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23312"
},
{
"name": "CVE-2021-41990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41990"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2021-46161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46161"
},
{
"name": "CVE-2021-41991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41991"
},
{
"name": "CVE-2021-46160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46160"
},
{
"name": "CVE-2022-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23102"
},
{
"name": "CVE-2019-11478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11478"
},
{
"name": "CVE-2019-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13933"
},
{
"name": "CVE-2019-8460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8460"
},
{
"name": "CVE-2019-6575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6575"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2019-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6568"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2015-7705",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7705"
},
{
"name": "CVE-2021-46156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46156"
},
{
"name": "CVE-2021-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37197"
},
{
"name": "CVE-2016-7433",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7433"
},
{
"name": "CVE-2021-37194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37194"
},
{
"name": "CVE-2021-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46153"
},
{
"name": "CVE-2016-4955",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4955"
},
{
"name": "CVE-2015-7853",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7853"
},
{
"name": "CVE-2021-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46152"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2015-8138",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8138"
},
{
"name": "CVE-2020-12360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12360"
},
{
"name": "CVE-2016-4954",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4954"
},
{
"name": "CVE-2020-24588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24588"
},
{
"name": "CVE-2021-37185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37185"
},
{
"name": "CVE-2021-46154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46154"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2021-37195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37195"
},
{
"name": "CVE-2020-8703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8703"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2020-12357",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12357"
},
{
"name": "CVE-2021-46159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46159"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2021-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40358"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2021-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43336"
},
{
"name": "CVE-2020-26144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26144"
},
{
"name": "CVE-2021-44000",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44000"
},
{
"name": "CVE-2021-20094",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
},
{
"name": "CVE-2020-24513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24513"
},
{
"name": "CVE-2019-11479",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11479"
},
{
"name": "CVE-2021-20093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
},
{
"name": "CVE-2021-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38405"
},
{
"name": "CVE-2020-24507",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24507"
},
{
"name": "CVE-2021-46155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46155"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2021-45046",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45046"
},
{
"name": "CVE-2020-12358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12358"
},
{
"name": "CVE-2021-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37196"
},
{
"name": "CVE-2021-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40364"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2021-37204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37204"
},
{
"name": "CVE-2019-19300",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19300"
},
{
"name": "CVE-2019-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13946"
},
{
"name": "CVE-2019-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10942"
},
{
"name": "CVE-2020-8670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8670"
},
{
"name": "CVE-2017-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2681"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2020-8704",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8704"
},
{
"name": "CVE-2020-28400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28400"
},
{
"name": "CVE-2021-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46158"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2016-7431",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7431"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2020-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26141"
},
{
"name": "CVE-2020-24486",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24486"
},
{
"name": "CVE-2020-24506",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24506"
},
{
"name": "CVE-2021-46157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46157"
},
{
"name": "CVE-2021-45106",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45106"
},
{
"name": "CVE-2020-24512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24512"
},
{
"name": "CVE-2020-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17437"
},
{
"name": "CVE-2021-44016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44016"
},
{
"name": "CVE-2020-24511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24511"
},
{
"name": "CVE-2021-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40359"
},
{
"name": "CVE-2021-37205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37205"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
},
{
"name": "CVE-2017-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6458"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
},
{
"name": "CVE-2019-19301",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19301"
},
{
"name": "CVE-2016-9042",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9042"
},
{
"name": "CVE-2020-26145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26145"
}
],
"initial_release_date": "2022-02-09T00:00:00",
"last_revision_date": "2022-02-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-124",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html"
}
]
}
cnvd-2019-18511
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://wiki.ubuntu.com/Security/Upgrades
| Name | Linux Kernel |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-11477"
}
},
"description": "Linux\u662f\u4e00\u5957\u514d\u8d39\u4f7f\u7528\u548c\u81ea\u7531\u4f20\u64ad\u7684\u7c7bUnix\u64cd\u4f5c\u7cfb\u7edf\uff0c\u662f\u4e00\u4e2a\u57fa\u4e8ePOSIX\u548cUNIX\u7684\u591a\u7528\u6237\u3001\u591a\u4efb\u52a1\u3001\u652f\u6301\u591a\u7ebf\u7a0b\u548c\u591aCPU\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nLinux kernel \u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u5bfc\u81f4\u8fc7\u591a\u7684\u5185\u5b58\u6d88\u8017\uff0c\u4ece\u800c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u7684\u60c5\u51b5\u3002",
"discovererName": "unKnow",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps\uff1a//wiki.ubuntu.com/Security/Upgrades",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-18511",
"openTime": "2019-06-19",
"patchDescription": "Linux\u662f\u4e00\u5957\u514d\u8d39\u4f7f\u7528\u548c\u81ea\u7531\u4f20\u64ad\u7684\u7c7bUnix\u64cd\u4f5c\u7cfb\u7edf\uff0c\u662f\u4e00\u4e2a\u57fa\u4e8ePOSIX\u548cUNIX\u7684\u591a\u7528\u6237\u3001\u591a\u4efb\u52a1\u3001\u652f\u6301\u591a\u7ebf\u7a0b\u548c\u591aCPU\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nLinux kernel \u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u6210\u529f\u5229\u7528\u8be5\u6f0f\u6d1e\u5c06\u5bfc\u81f4\u8fc7\u591a\u7684\u5185\u5b58\u6d88\u8017\uff0c\u4ece\u800c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u7684\u60c5\u51b5\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2019-18511\uff09\u7684\u8865\u4e01",
"products": {
"product": "Linux Kernel"
},
"referenceLink": "https://usn.ubuntu.com/4017-2/",
"serverity": "\u4e2d",
"submitTime": "2019-06-18",
"title": "Linux kernel\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2019-18511\uff09"
}
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-5.14.6-1.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10728",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
}
],
"title": "kernel-devel-5.14.6-1.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10728-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-devel-5.14.6-1.4.aarch64",
"product_id": "kernel-devel-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-macros-5.14.6-1.4.aarch64",
"product_id": "kernel-macros-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-5.14.6-1.4.aarch64",
"product_id": "kernel-source-5.14.6-1.4.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-devel-5.14.6-1.4.ppc64le",
"product_id": "kernel-devel-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-macros-5.14.6-1.4.ppc64le",
"product_id": "kernel-macros-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-5.14.6-1.4.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.s390x",
"product": {
"name": "kernel-devel-5.14.6-1.4.s390x",
"product_id": "kernel-devel-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.s390x",
"product": {
"name": "kernel-macros-5.14.6-1.4.s390x",
"product_id": "kernel-macros-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-5.14.6-1.4.s390x",
"product_id": "kernel-source-5.14.6-1.4.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x",
"product_id": "kernel-source-vanilla-5.14.6-1.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-devel-5.14.6-1.4.x86_64",
"product_id": "kernel-devel-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-macros-5.14.6-1.4.x86_64",
"product_id": "kernel-macros-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-5.14.6-1.4.x86_64",
"product_id": "kernel-source-5.14.6-1.4.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-devel-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-devel-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x"
},
"product_reference": "kernel-devel-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-devel-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-macros-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-macros-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x"
},
"product_reference": "kernel-macros-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-macros-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
},
"product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
}
]
}
opensuse-su-2019:1579-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values. (bsc#1137586)\n- CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service (bnc#1138291).\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n- CVE-2019-12456: local users could cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. (bnc#1136922)\n- CVE-2019-12380: phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures (bnc#1136598).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n- CVE-2019-10124: An attacker could exploit an issue in the hwpoison implementation to cause a denial of service (BUG). (bsc#1130699)\n- CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c. There was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1136586).\n- CVE-2019-11487: The Linux kernel before 5.1-rc5 allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bnc#1133190).\n- CVE-2019-5489: The mincore() implementation in mm/mincore.c allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server (bnc#1120843).\n- CVE-2019-11833: fs/ext4/extents.c did not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem (bnc#1135281).\n- CVE-2018-7191: In the tun subsystem dev_get_valid_name is not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343 (bnc#1135603).\n- CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics may have allowed an authenticated user to potentially enable escalation of privilege via local access (bnc#1135278).\n\nThe following non-security bugs were fixed:\n\n- 9p locks: add mount option for lock retry interval (bsc#1051510).\n- ACPI: Add Hygon Dhyana support ().\n- ACPI: button: reinitialize button state upon resume (bsc#1051510).\n- ACPICA: AML interpreter: add region addresses in global list during initialization (bsc#1051510).\n- ACPICA: Namespace: remove address node from global list after method termination (bsc#1051510).\n- ACPI: fix menuconfig presentation of ACPI submenu (bsc#1117158).\n- ACPI / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- ACPI / utils: Drop reference in test for device presence (bsc#1051510).\n- ALSA: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- ALSA: hda/realtek - Avoid superfluous COEF EAPD setups (bsc#1051510).\n- ALSA: hda/realtek - Corrected fixup for System76 Gazelle (gaze14) (bsc#1051510).\n- ALSA: hda/realtek - Fix for Lenovo B50-70 inverted internal microphone bug (bsc#1051510).\n- ALSA: hda/realtek - Fixup headphone noise via runtime suspend (bsc#1051510).\n- ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- ALSA: hda - Use a macro for snd_array iteration loops (bsc#1051510).\n- ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- appletalk: Fix compile regression (bsc#1051510).\n- appletalk: Fix use-after-free in atalk_proc_exit (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: fix ACPI dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_ACPI\n- arm: 8824/1: fix a migrating irq bug when hotplug cpu (bsc#1051510).\n- arm: 8833/1: Ensure that NEON code always compiles with Clang (bsc#1051510).\n- arm: 8839/1: kprobe: make patch_lock a raw_spinlock_t (bsc#1051510).\n- arm: 8840/1: use a raw_spinlock_t in unwind (bsc#1051510).\n- arm: avoid Cortex-A9 livelock on tight dmb loops (bsc#1051510).\n- arm: imx6q: cpuidle: fix bug that CPU might not wake up at expected time (bsc#1051510).\n- arm: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: OMAP2+: fix lack of timer interrupts on CPU1 after hotplug (bsc#1051510).\n- arm: OMAP2+: Variable \u0027reg\u0027 in function omap4_dsi_mux_pads() could be uninitialized (bsc#1051510).\n- arm: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- arm: pxa: ssp: unneeded to free devm_ allocated data (bsc#1051510).\n- arm: s3c24xx: Fix boolean expressions in osiris_dvs_notify (bsc#1051510).\n- arm: samsung: Limit SAMSUNG_PM_CHECK config option to non-Exynos platforms (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- backlight: lm3630a: Return 0 on success in update_status functions (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- block: do not leak memory in bio_copy_user_iov() (bsc#1135309).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- block: fix the return errno for direct IO (bsc#1135320).\n- block: fix use-after-free on gendisk (bsc#1135312).\n- Bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Improve RX consumer index validity check (networking-stable-19_04_10).\n- bnxt_en: Reset device on RX buffer errors (networking-stable-19_04_10).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_data_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: delayed-ref: Use btrfs_ref to refactor btrfs_add_delayed_tree_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: do not allow trimming when a fs is mounted with the nologreplay option (bsc#1135758).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: extent-tree: Fix a bug that btrfs is unable to add pinned bytes (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor add_pinned_bytes() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_free_extent() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: extent-tree: Use btrfs_ref to refactor btrfs_inc_extent_ref() (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: improve performance on fsync of files with multiple hardlinks (bsc#1123454).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: qgroup: Do not scan leaf if we\u0027re modifying reloc tree (bsc#1063638 bsc#1128052 bsc#1108838).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: send, flush dellaloc in order to avoid data loss (bsc#1133320).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- CIFS: keep FileInfo handle live during oplock break (bsc#1106284, bsc#1131565).\n- configfs: fix possible use-after-free in configfs_register_group (bsc#1051510).\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support ().\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- crypto: caam - fix caam_dump_sg that iterates through scatterlist (bsc#1051510).\n- crypto: vmx - CTR: always increment IV as quadword (bsc#1051510).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- dccp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- dccp: Fix memleak in __feat_register_sp (bsc#1051510).\n- debugfs: fix use-after-free on symlink traversal (bsc#1051510).\n- devres: Align data[] to ARCH_KMALLOC_MINALIGN (bsc#1051510).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- Documentation: Add MDS vulnerability documentation (bsc#1135642).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/bridge: adv7511: Fix low refresh rate selection (bsc#1051510).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915: Disable LP3 watermarks on all SNB machines (bsc#1051510).\n- drm/i915: Downgrade Gen9 Plane WM latency error (bsc#1051510).\n- drm/i915/fbc: disable framebuffer compression on GeminiLake (bsc#1051510).\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/imx: do not skip DP channel disable for background plane (bsc#1051510).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/rockchip: fix for mailbox read validation (bsc#1051510).\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- EDAC, amd64: Add Hygon Dhyana support ().\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566).\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- ext4: actually request zeroing of inode table after grow (bsc#1135315).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: fix ext4_show_options for file systems w/o journal (bsc#1135316).\n- ext4: fix use-after-free race with debug_want_extra_isize (bsc#1135314).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fix rtnh_ok() (git-fixes).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- genetlink: Fix a memory leak on error path (networking-stable-19_03_28).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- gpu: ipu-v3: dp: fix CSC handling (bsc#1051510).\n- HID: input: add mapping for Expose/Overview key (bsc#1051510).\n- HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys (bsc#1051510).\n- HID: input: add mapping for \u0027Toggle Display\u0027 key (bsc#1051510).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- igmp: fix incorrect unsolicit report count when join group (git-fixes).\n- iio: adc: xilinx: fix potential use-after-free on remove (bsc#1051510).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- inetpeer: fix uninit-value in inet_getpeer (git-fixes).\n- Input: elan_i2c - add hardware ID for multiple Lenovo laptops (bsc#1051510).\n- Input: synaptics-rmi4 - fix possible double free (bsc#1051510).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- ip6_tunnel: collect_md xmit: Use ip_tunnel_key\u0027s provided src address (git-fixes).\n- ip6_tunnel: Match to ARPHRD_TUNNEL6 for dev type (networking-stable-19_04_10).\n- ipconfig: Correctly initialise ic_nameservers (bsc#1051510).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6: fix cleanup ordering for ip6_mr failure (git-fixes).\n- ipv6: fix cleanup ordering for pingv6 registration (git-fixes).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipv6: mcast: fix unsolicited report interval after receiving querys (git-fixes).\n- ipvlan: Add the skb-\u003emark as flow4\u0027s member to lookup route (bsc#1051510).\n- ipvlan: fix ipv6 outbound device (bsc#1051510).\n- ipvlan: use ETH_MAX_MTU as max mtu (bsc#1051510).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- ipvs: fix buffer overflow with sync daemon and service (git-fixes).\n- ipvs: fix check on xmit to non-local addresses (git-fixes).\n- ipvs: fix race between ip_vs_conn_new() and ip_vs_del_dest() (bsc#1051510).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (git-fixes).\n- ipvs: Fix signed integer overflow when setsockopt timeout (bsc#1051510).\n- ipvs: fix stats update from local clients (git-fixes).\n- iw_cxgb4: only allow 1 flush on user qps (bsc#1051510).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- kmsg: Update message catalog to latest IBM level (2019/03/08) (bsc#1128904 LTC#176078).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- KVM: s390: provide io interrupt kvm_stat (bsc#1136206).\n- KVM: s390: use created_vcpus in more places (bsc#1136206).\n- KVM: s390: vsie: fix \u0026lt; 8k check for the itdba (bsc#1136206).\n- l2tp: cleanup l2tp_tunnel_delete calls (bsc#1051510).\n- l2tp: filter out non-PPP sessions in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: fix missing refcount drop in pppol2tp_tunnel_ioctl() (git-fixes).\n- l2tp: only accept PPP sessions in pppol2tp_connect() (git-fixes).\n- l2tp: prevent pppol2tp_connect() from creating kernel sockets (git-fixes).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bsc#1051510).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- leds: pwm: silently error out on EPROBE_DEFER (bsc#1051510).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- mac80211: fix memory accounting with A-MSDU aggregation (bsc#1051510).\n- mac80211: fix unaligned access in mesh table hash function (bsc#1051510).\n- mac8390: Fix mmio access size probe (bsc#1051510).\n- MD: fix invalid stored role for a disk (bsc#1051510).\n- media: atmel: atmel-isc: fix INIT_WORK misplacement (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: davinci/vpbe: array underflow in vpbe_enum_outputs() (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: omap_vout: potential buffer overflow in vidioc_dqbuf() (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mISDN: Check address length before reading address family (bsc#1051510).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm/huge_memory: fix vmf_insert_pfn_{pmd, pud}() crash, handle unaligned addresses (bsc#1135330).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net: aquantia: fix rx checksum offload for UDP/TCP over IPv6 (networking-stable-19_03_28).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- net: ethtool: not call vzalloc for zero sized memory request (networking-stable-19_04_10).\n- netfilter: bridge: Do not sabotage nf_hook calls from an l3mdev (git-fixes).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ebtables: handle string from userspace with care (git-fixes).\n- netfilter: ebtables: reject non-bridge targets (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_log: do not hold nf_log_mutex during user access (git-fixes).\n- netfilter: nf_log: fix uninit read in nf_log_proc_dostring (git-fixes).\n- netfilter: nf_tables: can\u0027t fail after linking rule into active rule list (git-fixes).\n- netfilter: nf_tables: check msg_type before nft_trans_set(trans) (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nf_tables: fix NULL pointer dereference on nft_ct_helper_obj_dump() (git-fixes).\n- netfilter: nf_tables: release chain in flushing set (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- netfilter: x_tables: initialise match/target check parameter struct (git-fixes).\n- net: Fix a bug in removing queues from XPS map (git-fixes).\n- net: fix uninit-value in __hw_addr_add_ex() (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net-gro: Fix GRO flush when receiving a GSO packet (networking-stable-19_04_10).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net: initialize skb-\u003epeeked when cloning (git-fixes).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net/ipv6: do not reinitialize ndev-\u003ecnf.addr_gen_mode on new inet6_dev (git-fixes).\n- net/ipv6: fix addrconf_sysctl_addr_gen_mode (git-fixes).\n- net/ipv6: propagate net.ipv6.conf.all.addr_gen_mode to devices (git-fixes).\n- net/ipv6: reserve room for IFLA_INET6_ADDR_GEN_MODE (git-fixes).\n- netlink: fix uninit-value in netlink_sendmsg (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net/mlx5: Decrease default mr cache size (networking-stable-19_04_10).\n- net/mlx5e: Add a lock on tir list (networking-stable-19_04_10).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/mlx5e: Fix error handling when refreshing TIRs (networking-stable-19_04_10).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net: rose: fix a possible stack overflow (networking-stable-19_03_28).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: act_sample: fix divide by zero in the traffic path (networking-stable-19_04_10).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net/sched: fix -\u003eget helper of the matchall cls (networking-stable-19_04_10).\n- net: socket: fix potential spectre v1 gadget in socketcall (git-fixes).\n- net: stmmac: fix memory corruption with large MTUs (networking-stable-19_03_28).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: test tailroom before appending to linear skb (git-fixes).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n- nl80211: Add NL80211_FLAG_CLEAR_SKB flag for other NL commands (bsc#1051510).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (git-fixes).\n- packet: refine ring v3 block size test to hold one frame (git-fixes).\n- packet: reset network header if packet shorter than ll reserved space (git-fixes).\n- packets: Always register packet sk in the same order (networking-stable-19_03_28).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- PCI: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- PCI: Factor out pcie_retrain_link() function (git-fixes).\n- PCI: Mark AMD Stoney Radeon R7 GPU ATS as broken (bsc#1051510).\n- PCI: Mark Atheros AR9462 to avoid bus reset (bsc#1051510).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: Work around Pericom PCIe-to-PCI bridge Retrain Link erratum (git-fixes).\n- perf tools: Add Hygon Dhyana support ().\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- power: supply: axp20x_usb_power: Fix typo in VBUS current limit macros (bsc#1051510).\n- power: supply: axp288_charger: Fix unchecked return value (bsc#1051510).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- RDMA/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- Revert \u0027ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rxrpc: Fix error reception on AF_INET6 sockets (git-fixes).\n- rxrpc: Fix transport sockopts to get IPv4 errors on an IPv6 socket (git-fixes).\n- s390/qdio: clear intparm during shutdown (bsc#1134597 LTC#177516).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: fix error message on \u0026lt;qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- sctp: fix identification of new acks for SFR-CACC (git-fixes).\n- sctp: get sctphdr by offset in sctp_compute_cksum (networking-stable-19_03_28).\n- sctp: initialize _pad of sockaddr_in before copying to user memory (networking-stable-19_04_10).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- soc/fsl/qe: Fix an error code in qe_pin_request() (bsc#1051510).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi: Micrel eth switch: declare missing of table (bsc#1051510).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: ST ST95HF NFC: declare missing of table (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: do not use ipv6 header for ipv4 flow (networking-stable-19_03_28).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: Ensure DCTCP reacts to losses (networking-stable-19_04_10).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: purge write queue in tcp_connect_init() (git-fixes).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- team: set slave to promisc if team is already in promisc mode (bsc#1051510).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thermal: cpu_cooling: Actually trace CPU load in thermal_power_cpu_get_power (bsc#1051510).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- thunderx: eliminate extra calls to put_page() for pages held for recycling (networking-stable-19_03_28).\n- thunderx: enable page recycling for non-XDP case (networking-stable-19_03_28).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools/cpupower: Add Hygon Dhyana support ().\n- tools lib traceevent: Fix missing equality check for strcmp (bsc#1129770).\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- TTY: serial_core, add -\u003einstall (bnc#1129693).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- tun: add a missing rcu_read_unlock() in error path (networking-stable-19_03_28).\n- tun: properly test for IFF_UP (networking-stable-19_03_28).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- ufs: fix braino in ufs_get_inode_gid() for solaris UFS flavour (bsc#1135323).\n- Update config files: CONFIG_NVMEM_IMX_OCOTP=m for armvh7hl/lpae\n- Update config files. Debug kernel is not supported (bsc#1135492).\n- Update config files: disable CONFIG_IDE on ppc64le\n- Update config files for NFSv4.2 Enable NFSv4.2 support - jsc@PM-231 This requires a module parameter for NFSv4.2 to actually be available on SLE12 and SLE15-SP0\n- Update cx2072x patches to follow the upstream development (bsc#1068546)\n- Update patch reference for ipmi_ssif fix (bsc#1135120)\n- usb: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- usb: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- usb: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- usb: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- usb: rio500: refuse more than one device at a time (bsc#1051510).\n- usb: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vrf: check accept_source_route on the original netdevice (networking-stable-19_04_10).\n- vsock/virtio: Initialize core virtio vsock before registering the driver (bsc#1051510).\n- vt: always call notifier with the console lock held (bsc#1051510).\n- vxlan: Do not call gro_cells_destroy() before device is unregistered (networking-stable-19_03_28).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to KVM ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/speculation/mds: Fix documentation typo (bsc#1135642).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfrm6: avoid potential infinite loop in _decode_session6() (git-fixes).\n- xfrm6: call kfree_skb when skb is toobig (git-fixes).\n- xfrm: fix missing dst_release() after policy blocking lbcast and multicast (git-fixes).\n- xfrm: fix \u0027passing zero to ERR_PTR()\u0027 warning (git-fixes).\n- xfrm: reset crypto_done when iterating over multiple input xfrms (git-fixes).\n- xfrm: reset transport header back to network header after all input transforms ahave been applied (git-fixes).\n- xfrm_user: prevent leaking 2 bytes of kernel memory (git-fixes).\n- xfrm: Validate address prefix lengths in the xfrm selector (git-fixes).\n- xfs: add log item pinning error injection tag (bsc#1114427).\n- xfs: buffer lru reference count error injection tag (bsc#1114427).\n- xfs: check _btree_check_block value (bsc#1123663).\n- xfs: convert drop_writes to use the errortag mechanism (bsc#1114427).\n- xfs: create block pointer check functions (bsc#1123663).\n- xfs: create inode pointer verifiers (bsc#1114427).\n- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: export _inobt_btrec_to_irec and _ialloc_cluster_alignment for scrub (bsc#1114427).\n- xfs: export various function for the online scrubber (bsc#1123663).\n- xfs: expose errortag knobs via sysfs (bsc#1114427).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: fix unused variable warning in xfs_buf_set_ref() (bsc#1114427).\n- xfs: force summary counter recalc at next mount (bsc#1114427).\n- xfs: make errortag a per-mountpoint structure (bsc#1123663).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: move error injection tags into their own file (bsc#1114427).\n- xfs: refactor btree block header checking functions (bsc#1123663).\n- xfs: refactor btree pointer checks (bsc#1123663).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: refactor unmount record write (bsc#1114427).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unneeded parameter from XFS_TEST_ERROR (bsc#1123663).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename MAXPATHLEN to XFS_SYMLINK_MAXLEN (bsc#1123663).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: replace log_badcrc_factor knob with error injection tag (bsc#1114427).\n- xfs: sanity-check the unused space before trying to use it (bsc#1123663).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1579",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1579-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1579-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1579-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1063638",
"url": "https://bugzilla.suse.com/1063638"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1106284",
"url": "https://bugzilla.suse.com/1106284"
},
{
"category": "self",
"summary": "SUSE Bug 1108838",
"url": "https://bugzilla.suse.com/1108838"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1114427",
"url": "https://bugzilla.suse.com/1114427"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120843",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1123454",
"url": "https://bugzilla.suse.com/1123454"
},
{
"category": "self",
"summary": "SUSE Bug 1123663",
"url": "https://bugzilla.suse.com/1123663"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128052",
"url": "https://bugzilla.suse.com/1128052"
},
{
"category": "self",
"summary": "SUSE Bug 1128432",
"url": "https://bugzilla.suse.com/1128432"
},
{
"category": "self",
"summary": "SUSE Bug 1128904",
"url": "https://bugzilla.suse.com/1128904"
},
{
"category": "self",
"summary": "SUSE Bug 1129693",
"url": "https://bugzilla.suse.com/1129693"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1131565",
"url": "https://bugzilla.suse.com/1131565"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133320",
"url": "https://bugzilla.suse.com/1133320"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134597",
"url": "https://bugzilla.suse.com/1134597"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135120",
"url": "https://bugzilla.suse.com/1135120"
},
{
"category": "self",
"summary": "SUSE Bug 1135278",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "self",
"summary": "SUSE Bug 1135281",
"url": "https://bugzilla.suse.com/1135281"
},
{
"category": "self",
"summary": "SUSE Bug 1135309",
"url": "https://bugzilla.suse.com/1135309"
},
{
"category": "self",
"summary": "SUSE Bug 1135312",
"url": "https://bugzilla.suse.com/1135312"
},
{
"category": "self",
"summary": "SUSE Bug 1135314",
"url": "https://bugzilla.suse.com/1135314"
},
{
"category": "self",
"summary": "SUSE Bug 1135315",
"url": "https://bugzilla.suse.com/1135315"
},
{
"category": "self",
"summary": "SUSE Bug 1135316",
"url": "https://bugzilla.suse.com/1135316"
},
{
"category": "self",
"summary": "SUSE Bug 1135320",
"url": "https://bugzilla.suse.com/1135320"
},
{
"category": "self",
"summary": "SUSE Bug 1135323",
"url": "https://bugzilla.suse.com/1135323"
},
{
"category": "self",
"summary": "SUSE Bug 1135330",
"url": "https://bugzilla.suse.com/1135330"
},
{
"category": "self",
"summary": "SUSE Bug 1135492",
"url": "https://bugzilla.suse.com/1135492"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135603",
"url": "https://bugzilla.suse.com/1135603"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1135758",
"url": "https://bugzilla.suse.com/1135758"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136598",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136922",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137429",
"url": "https://bugzilla.suse.com/1137429"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 1137995",
"url": "https://bugzilla.suse.com/1137995"
},
{
"category": "self",
"summary": "SUSE Bug 1137996",
"url": "https://bugzilla.suse.com/1137996"
},
{
"category": "self",
"summary": "SUSE Bug 1137998",
"url": "https://bugzilla.suse.com/1137998"
},
{
"category": "self",
"summary": "SUSE Bug 1137999",
"url": "https://bugzilla.suse.com/1137999"
},
{
"category": "self",
"summary": "SUSE Bug 1138000",
"url": "https://bugzilla.suse.com/1138000"
},
{
"category": "self",
"summary": "SUSE Bug 1138002",
"url": "https://bugzilla.suse.com/1138002"
},
{
"category": "self",
"summary": "SUSE Bug 1138003",
"url": "https://bugzilla.suse.com/1138003"
},
{
"category": "self",
"summary": "SUSE Bug 1138005",
"url": "https://bugzilla.suse.com/1138005"
},
{
"category": "self",
"summary": "SUSE Bug 1138006",
"url": "https://bugzilla.suse.com/1138006"
},
{
"category": "self",
"summary": "SUSE Bug 1138007",
"url": "https://bugzilla.suse.com/1138007"
},
{
"category": "self",
"summary": "SUSE Bug 1138008",
"url": "https://bugzilla.suse.com/1138008"
},
{
"category": "self",
"summary": "SUSE Bug 1138009",
"url": "https://bugzilla.suse.com/1138009"
},
{
"category": "self",
"summary": "SUSE Bug 1138010",
"url": "https://bugzilla.suse.com/1138010"
},
{
"category": "self",
"summary": "SUSE Bug 1138011",
"url": "https://bugzilla.suse.com/1138011"
},
{
"category": "self",
"summary": "SUSE Bug 1138012",
"url": "https://bugzilla.suse.com/1138012"
},
{
"category": "self",
"summary": "SUSE Bug 1138013",
"url": "https://bugzilla.suse.com/1138013"
},
{
"category": "self",
"summary": "SUSE Bug 1138014",
"url": "https://bugzilla.suse.com/1138014"
},
{
"category": "self",
"summary": "SUSE Bug 1138015",
"url": "https://bugzilla.suse.com/1138015"
},
{
"category": "self",
"summary": "SUSE Bug 1138016",
"url": "https://bugzilla.suse.com/1138016"
},
{
"category": "self",
"summary": "SUSE Bug 1138017",
"url": "https://bugzilla.suse.com/1138017"
},
{
"category": "self",
"summary": "SUSE Bug 1138018",
"url": "https://bugzilla.suse.com/1138018"
},
{
"category": "self",
"summary": "SUSE Bug 1138019",
"url": "https://bugzilla.suse.com/1138019"
},
{
"category": "self",
"summary": "SUSE Bug 1138291",
"url": "https://bugzilla.suse.com/1138291"
},
{
"category": "self",
"summary": "SUSE Bug 1138293",
"url": "https://bugzilla.suse.com/1138293"
},
{
"category": "self",
"summary": "SUSE Bug 1138374",
"url": "https://bugzilla.suse.com/1138374"
},
{
"category": "self",
"summary": "SUSE Bug 1138375",
"url": "https://bugzilla.suse.com/1138375"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11085 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11833 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12380 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5489 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5489/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-18T14:54:20Z",
"generator": {
"date": "2019-06-18T14:54:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1579-1",
"initial_release_date": "2019-06-18T14:54:20Z",
"revision_history": [
{
"date": "2019-06-18T14:54:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-devel-4.12.14-lp150.12.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-docs-4.12.14-lp150.12.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp150.12.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-macros-4.12.14-lp150.12.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-source-4.12.14-lp150.12.64.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-default-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7191"
}
],
"notes": [
{
"category": "general",
"text": "In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7191",
"url": "https://www.suse.com/security/cve/CVE-2018-7191"
},
{
"category": "external",
"summary": "SUSE Bug 1135603 for CVE-2018-7191",
"url": "https://bugzilla.suse.com/1135603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2018-7191"
},
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11085"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in Kernel Mode Driver in Intel(R) i915 Graphics for Linux before version 5.0 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11085",
"url": "https://www.suse.com/security/cve/CVE-2019-11085"
},
{
"category": "external",
"summary": "SUSE Bug 1135278 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135278"
},
{
"category": "external",
"summary": "SUSE Bug 1135280 for CVE-2019-11085",
"url": "https://bugzilla.suse.com/1135280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-11085"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-11833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11833"
}
],
"notes": [
{
"category": "general",
"text": "fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11833",
"url": "https://www.suse.com/security/cve/CVE-2019-11833"
},
{
"category": "external",
"summary": "SUSE Bug 1135281 for CVE-2019-11833",
"url": "https://bugzilla.suse.com/1135281"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-11833"
},
{
"cve": "CVE-2019-12380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12380"
}
],
"notes": [
{
"category": "general",
"text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12380",
"url": "https://www.suse.com/security/cve/CVE-2019-12380"
},
{
"category": "external",
"summary": "SUSE Bug 1136598 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "low"
}
],
"title": "CVE-2019-12380"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12456"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12456",
"url": "https://www.suse.com/security/cve/CVE-2019-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1136922 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "external",
"summary": "SUSE Bug 1136993 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-12456"
},
{
"cve": "CVE-2019-12818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12818"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12818",
"url": "https://www.suse.com/security/cve/CVE-2019-12818"
},
{
"category": "external",
"summary": "SUSE Bug 1138293 for CVE-2019-12818",
"url": "https://bugzilla.suse.com/1138293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "low"
}
],
"title": "CVE-2019-12818"
},
{
"cve": "CVE-2019-12819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12819"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12819",
"url": "https://www.suse.com/security/cve/CVE-2019-12819"
},
{
"category": "external",
"summary": "SUSE Bug 1138291 for CVE-2019-12819",
"url": "https://bugzilla.suse.com/1138291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "low"
}
],
"title": "CVE-2019-12819"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-5489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5489"
}
],
"notes": [
{
"category": "general",
"text": "The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5489",
"url": "https://www.suse.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "SUSE Bug 1120843 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120843"
},
{
"category": "external",
"summary": "SUSE Bug 1120885 for CVE-2019-5489",
"url": "https://bugzilla.suse.com/1120885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.64.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.64.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T14:54:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-5489"
}
]
}
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13704",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000251 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12153 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13080 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14051 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15129 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15265 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16536 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16537 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16645 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16646 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16647 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16647/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16648 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16996 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17448 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17449 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17450 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17450/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17852 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17853 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17854 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17855 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5123 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8824 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8831 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000004 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10322 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10323 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1068 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12232 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12714 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18710 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5332 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5333 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5333/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8043 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8822 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14615 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14896 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15099 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15504 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18813 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19252 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3882 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3887 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6974 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7222 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8564 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8912 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9500 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10766 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10767 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12351 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12352 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12352/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14386 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24587 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24588 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25639 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25656 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25668 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26141 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2732 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29660 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29661 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8694 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2021-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26708 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28971 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-32606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-32606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33909 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3489 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3489/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3491 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3491/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3759 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38166 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43976 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0185 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0330 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0847 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1852 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1972 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1973 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2308 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-24958 page",
"url": "https://www.suse.com/security/cve/CVE-2022-24958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2590 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26490 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28388 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28389 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28390 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28893 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29968 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3424 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3628 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41218 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-41674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-41674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42719 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42721 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-42722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-42722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-4379 page",
"url": "https://www.suse.com/security/cve/CVE-2022-4379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44032 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44032/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44033 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-44034 page",
"url": "https://www.suse.com/security/cve/CVE-2022-44034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45884 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45885 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45887 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45888 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45934 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0045 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1076 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1078 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1380 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-31084 page",
"url": "https://www.suse.com/security/cve/CVE-2023-31084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3141 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3269 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39192 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-39193 page",
"url": "https://www.suse.com/security/cve/CVE-2023-39193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4128 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4134 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4194 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-42756 page",
"url": "https://www.suse.com/security/cve/CVE-2023-42756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4623 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46813 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-5345 page",
"url": "https://www.suse.com/security/cve/CVE-2023-5345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6606 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-6610 page",
"url": "https://www.suse.com/security/cve/CVE-2023-6610/"
}
],
"title": "kernel-devel-longterm-6.6.17-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13704-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64",
"product_id": "kernel-source-longterm-6.6.17-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-devel-longterm-6.6.17-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x",
"product_id": "kernel-source-longterm-6.6.17-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64",
"product_id": "kernel-source-longterm-6.6.17-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
},
"product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2017-1000251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000251"
}
],
"notes": [
{
"category": "general",
"text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000251",
"url": "https://www.suse.com/security/cve/CVE-2017-1000251"
},
{
"category": "external",
"summary": "SUSE Bug 1057389 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057389"
},
{
"category": "external",
"summary": "SUSE Bug 1057950 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1057950"
},
{
"category": "external",
"summary": "SUSE Bug 1070535 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1070535"
},
{
"category": "external",
"summary": "SUSE Bug 1072117 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072117"
},
{
"category": "external",
"summary": "SUSE Bug 1072162 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1072162"
},
{
"category": "external",
"summary": "SUSE Bug 1120758 for CVE-2017-1000251",
"url": "https://bugzilla.suse.com/1120758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000251"
},
{
"cve": "CVE-2017-12153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12153"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12153",
"url": "https://www.suse.com/security/cve/CVE-2017-12153"
},
{
"category": "external",
"summary": "SUSE Bug 1058410 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058410"
},
{
"category": "external",
"summary": "SUSE Bug 1058624 for CVE-2017-12153",
"url": "https://bugzilla.suse.com/1058624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12153"
},
{
"cve": "CVE-2017-13080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13080"
}
],
"notes": [
{
"category": "general",
"text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13080",
"url": "https://www.suse.com/security/cve/CVE-2017-13080"
},
{
"category": "external",
"summary": "SUSE Bug 1056061 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1056061"
},
{
"category": "external",
"summary": "SUSE Bug 1063479 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063479"
},
{
"category": "external",
"summary": "SUSE Bug 1063667 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063667"
},
{
"category": "external",
"summary": "SUSE Bug 1063671 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1063671"
},
{
"category": "external",
"summary": "SUSE Bug 1066295 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1066295"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1178872 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1178872"
},
{
"category": "external",
"summary": "SUSE Bug 1179588 for CVE-2017-13080",
"url": "https://bugzilla.suse.com/1179588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-13080"
},
{
"cve": "CVE-2017-14051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14051"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14051",
"url": "https://www.suse.com/security/cve/CVE-2017-14051"
},
{
"category": "external",
"summary": "SUSE Bug 1056588 for CVE-2017-14051",
"url": "https://bugzilla.suse.com/1056588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-14051"
},
{
"cve": "CVE-2017-15129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15129"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15129",
"url": "https://www.suse.com/security/cve/CVE-2017-15129"
},
{
"category": "external",
"summary": "SUSE Bug 1074839 for CVE-2017-15129",
"url": "https://bugzilla.suse.com/1074839"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15129"
},
{
"cve": "CVE-2017-15265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15265"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15265",
"url": "https://www.suse.com/security/cve/CVE-2017-15265"
},
{
"category": "external",
"summary": "SUSE Bug 1062520 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1062520"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-15265",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15265"
},
{
"cve": "CVE-2017-16536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16536"
}
],
"notes": [
{
"category": "general",
"text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16536",
"url": "https://www.suse.com/security/cve/CVE-2017-16536"
},
{
"category": "external",
"summary": "SUSE Bug 1066606 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1066606"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16536",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16536"
},
{
"cve": "CVE-2017-16537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16537"
}
],
"notes": [
{
"category": "general",
"text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16537",
"url": "https://www.suse.com/security/cve/CVE-2017-16537"
},
{
"category": "external",
"summary": "SUSE Bug 1066573 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1066573"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16537",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16537"
},
{
"cve": "CVE-2017-16645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16645"
}
],
"notes": [
{
"category": "general",
"text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16645",
"url": "https://www.suse.com/security/cve/CVE-2017-16645"
},
{
"category": "external",
"summary": "SUSE Bug 1067132 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1067132"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16645",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16645"
},
{
"cve": "CVE-2017-16646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16646"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16646",
"url": "https://www.suse.com/security/cve/CVE-2017-16646"
},
{
"category": "external",
"summary": "SUSE Bug 1067105 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1067105"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16646",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16646"
},
{
"cve": "CVE-2017-16647",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16647"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16647",
"url": "https://www.suse.com/security/cve/CVE-2017-16647"
},
{
"category": "external",
"summary": "SUSE Bug 1067102 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1067102"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16647",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16647"
},
{
"cve": "CVE-2017-16648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16648"
}
],
"notes": [
{
"category": "general",
"text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16648",
"url": "https://www.suse.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "SUSE Bug 1067087 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1067087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2017-16648",
"url": "https://bugzilla.suse.com/1146519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16648"
},
{
"cve": "CVE-2017-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16995"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16995",
"url": "https://www.suse.com/security/cve/CVE-2017-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16995",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16995"
},
{
"cve": "CVE-2017-16996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16996"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16996",
"url": "https://www.suse.com/security/cve/CVE-2017-16996"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-16996",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-16996"
},
{
"cve": "CVE-2017-17448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17448"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17448",
"url": "https://www.suse.com/security/cve/CVE-2017-17448"
},
{
"category": "external",
"summary": "SUSE Bug 1071693 for CVE-2017-17448",
"url": "https://bugzilla.suse.com/1071693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17448"
},
{
"cve": "CVE-2017-17449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17449"
}
],
"notes": [
{
"category": "general",
"text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17449",
"url": "https://www.suse.com/security/cve/CVE-2017-17449"
},
{
"category": "external",
"summary": "SUSE Bug 1071694 for CVE-2017-17449",
"url": "https://bugzilla.suse.com/1071694"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17449"
},
{
"cve": "CVE-2017-17450",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17450"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17450",
"url": "https://www.suse.com/security/cve/CVE-2017-17450"
},
{
"category": "external",
"summary": "SUSE Bug 1071695 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1071695"
},
{
"category": "external",
"summary": "SUSE Bug 1074033 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1074033"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-17450",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17450"
},
{
"cve": "CVE-2017-17852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17852"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17852",
"url": "https://www.suse.com/security/cve/CVE-2017-17852"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17852",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17852"
},
{
"cve": "CVE-2017-17853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17853"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17853",
"url": "https://www.suse.com/security/cve/CVE-2017-17853"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17853",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17853"
},
{
"cve": "CVE-2017-17854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17854"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17854",
"url": "https://www.suse.com/security/cve/CVE-2017-17854"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17854",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17854"
},
{
"cve": "CVE-2017-17855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17855"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17855",
"url": "https://www.suse.com/security/cve/CVE-2017-17855"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17855",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17855"
},
{
"cve": "CVE-2017-17856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17856"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17856",
"url": "https://www.suse.com/security/cve/CVE-2017-17856"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17856",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17856"
},
{
"cve": "CVE-2017-17857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17857"
}
],
"notes": [
{
"category": "general",
"text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17857",
"url": "https://www.suse.com/security/cve/CVE-2017-17857"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17857",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17857"
},
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-5123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5123"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5123",
"url": "https://www.suse.com/security/cve/CVE-2017-5123"
},
{
"category": "external",
"summary": "SUSE Bug 1062473 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1062473"
},
{
"category": "external",
"summary": "SUSE Bug 1122971 for CVE-2017-5123",
"url": "https://bugzilla.suse.com/1122971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5123"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2017-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7541"
}
],
"notes": [
{
"category": "general",
"text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7541",
"url": "https://www.suse.com/security/cve/CVE-2017-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1049645 for CVE-2017-7541",
"url": "https://bugzilla.suse.com/1049645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7541"
},
{
"cve": "CVE-2017-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7542"
}
],
"notes": [
{
"category": "general",
"text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7542",
"url": "https://www.suse.com/security/cve/CVE-2017-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1049882 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1049882"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-7542",
"url": "https://bugzilla.suse.com/1061936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7542"
},
{
"cve": "CVE-2017-8824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8824"
}
],
"notes": [
{
"category": "general",
"text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8824",
"url": "https://www.suse.com/security/cve/CVE-2017-8824"
},
{
"category": "external",
"summary": "SUSE Bug 1070771 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1070771"
},
{
"category": "external",
"summary": "SUSE Bug 1076734 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1076734"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8824",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-8824"
},
{
"cve": "CVE-2017-8831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8831"
}
],
"notes": [
{
"category": "general",
"text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8831",
"url": "https://www.suse.com/security/cve/CVE-2017-8831"
},
{
"category": "external",
"summary": "SUSE Bug 1037994 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1037994"
},
{
"category": "external",
"summary": "SUSE Bug 1061936 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1061936"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-8831",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-8831"
},
{
"cve": "CVE-2018-1000004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000004",
"url": "https://www.suse.com/security/cve/CVE-2018-1000004"
},
{
"category": "external",
"summary": "SUSE Bug 1076017 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1076017"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-1000004",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000004"
},
{
"cve": "CVE-2018-10322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10322"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10322",
"url": "https://www.suse.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090749 for CVE-2018-10322",
"url": "https://bugzilla.suse.com/1090749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10322"
},
{
"cve": "CVE-2018-10323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10323"
}
],
"notes": [
{
"category": "general",
"text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10323",
"url": "https://www.suse.com/security/cve/CVE-2018-10323"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090717 for CVE-2018-10323",
"url": "https://bugzilla.suse.com/1090717"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10323"
},
{
"cve": "CVE-2018-1068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1068"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1068",
"url": "https://www.suse.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "SUSE Bug 1085107 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085107"
},
{
"category": "external",
"summary": "SUSE Bug 1085114 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1085114"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1123903 for CVE-2018-1068",
"url": "https://bugzilla.suse.com/1123903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1068"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-12232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12232"
}
],
"notes": [
{
"category": "general",
"text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12232",
"url": "https://www.suse.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097593 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1097593"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1127757 for CVE-2018-12232",
"url": "https://bugzilla.suse.com/1127757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12232"
},
{
"cve": "CVE-2018-12714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12714"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12714",
"url": "https://www.suse.com/security/cve/CVE-2018-12714"
},
{
"category": "external",
"summary": "SUSE Bug 1098933 for CVE-2018-12714",
"url": "https://bugzilla.suse.com/1098933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12714"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-18710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18710"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18710",
"url": "https://www.suse.com/security/cve/CVE-2018-18710"
},
{
"category": "external",
"summary": "SUSE Bug 1113751 for CVE-2018-18710",
"url": "https://bugzilla.suse.com/1113751"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18710"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-5332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5332"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5332",
"url": "https://www.suse.com/security/cve/CVE-2018-5332"
},
{
"category": "external",
"summary": "SUSE Bug 1075621 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1075621"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5332",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5332"
},
{
"cve": "CVE-2018-5333",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5333"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5333",
"url": "https://www.suse.com/security/cve/CVE-2018-5333"
},
{
"category": "external",
"summary": "SUSE Bug 1075617 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1075617"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-5333",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5333"
},
{
"cve": "CVE-2018-8043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8043"
}
],
"notes": [
{
"category": "general",
"text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8043",
"url": "https://www.suse.com/security/cve/CVE-2018-8043"
},
{
"category": "external",
"summary": "SUSE Bug 1084829 for CVE-2018-8043",
"url": "https://bugzilla.suse.com/1084829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-8043"
},
{
"cve": "CVE-2018-8087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8087"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8087",
"url": "https://www.suse.com/security/cve/CVE-2018-8087"
},
{
"category": "external",
"summary": "SUSE Bug 1085053 for CVE-2018-8087",
"url": "https://bugzilla.suse.com/1085053"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8087"
},
{
"cve": "CVE-2018-8822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8822"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8822",
"url": "https://www.suse.com/security/cve/CVE-2018-8822"
},
{
"category": "external",
"summary": "SUSE Bug 1086162 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1086162"
},
{
"category": "external",
"summary": "SUSE Bug 1090404 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1090404"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-8822",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-8822"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-14615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14615",
"url": "https://www.suse.com/security/cve/CVE-2019-14615"
},
{
"category": "external",
"summary": "SUSE Bug 1160195 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1160195"
},
{
"category": "external",
"summary": "SUSE Bug 1165881 for CVE-2019-14615",
"url": "https://bugzilla.suse.com/1165881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14615"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14896"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14896",
"url": "https://www.suse.com/security/cve/CVE-2019-14896"
},
{
"category": "external",
"summary": "SUSE Bug 1157157 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1157157"
},
{
"category": "external",
"summary": "SUSE Bug 1160468 for CVE-2019-14896",
"url": "https://bugzilla.suse.com/1160468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14896"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15099"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15099",
"url": "https://www.suse.com/security/cve/CVE-2019-15099"
},
{
"category": "external",
"summary": "SUSE Bug 1146368 for CVE-2019-15099",
"url": "https://bugzilla.suse.com/1146368"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15099"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15504"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15504",
"url": "https://www.suse.com/security/cve/CVE-2019-15504"
},
{
"category": "external",
"summary": "SUSE Bug 1147116 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1147116"
},
{
"category": "external",
"summary": "SUSE Bug 1185852 for CVE-2019-15504",
"url": "https://bugzilla.suse.com/1185852"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-15504"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18812"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18812",
"url": "https://www.suse.com/security/cve/CVE-2019-18812"
},
{
"category": "external",
"summary": "SUSE Bug 1156277 for CVE-2019-18812",
"url": "https://bugzilla.suse.com/1156277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18812"
},
{
"cve": "CVE-2019-18813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18813"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18813",
"url": "https://www.suse.com/security/cve/CVE-2019-18813"
},
{
"category": "external",
"summary": "SUSE Bug 1156278 for CVE-2019-18813",
"url": "https://bugzilla.suse.com/1156278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-18813"
},
{
"cve": "CVE-2019-19252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19252"
}
],
"notes": [
{
"category": "general",
"text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19252",
"url": "https://www.suse.com/security/cve/CVE-2019-19252"
},
{
"category": "external",
"summary": "SUSE Bug 1157813 for CVE-2019-19252",
"url": "https://bugzilla.suse.com/1157813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19252"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3016"
}
],
"notes": [
{
"category": "general",
"text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3016",
"url": "https://www.suse.com/security/cve/CVE-2019-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1161154 for CVE-2019-3016",
"url": "https://bugzilla.suse.com/1161154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3016"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
},
{
"cve": "CVE-2019-3882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3882"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3882",
"url": "https://www.suse.com/security/cve/CVE-2019-3882"
},
{
"category": "external",
"summary": "SUSE Bug 1131416 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131416"
},
{
"category": "external",
"summary": "SUSE Bug 1131427 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1131427"
},
{
"category": "external",
"summary": "SUSE Bug 1133319 for CVE-2019-3882",
"url": "https://bugzilla.suse.com/1133319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3882"
},
{
"cve": "CVE-2019-3887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3887"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3887",
"url": "https://www.suse.com/security/cve/CVE-2019-3887"
},
{
"category": "external",
"summary": "SUSE Bug 1131800 for CVE-2019-3887",
"url": "https://bugzilla.suse.com/1131800"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3887"
},
{
"cve": "CVE-2019-6974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6974"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6974",
"url": "https://www.suse.com/security/cve/CVE-2019-6974"
},
{
"category": "external",
"summary": "SUSE Bug 1124728 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124728"
},
{
"category": "external",
"summary": "SUSE Bug 1124729 for CVE-2019-6974",
"url": "https://bugzilla.suse.com/1124729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-6974"
},
{
"cve": "CVE-2019-7221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7221"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7221",
"url": "https://www.suse.com/security/cve/CVE-2019-7221"
},
{
"category": "external",
"summary": "SUSE Bug 1124732 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124732"
},
{
"category": "external",
"summary": "SUSE Bug 1124734 for CVE-2019-7221",
"url": "https://bugzilla.suse.com/1124734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7221"
},
{
"cve": "CVE-2019-7222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7222"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7222",
"url": "https://www.suse.com/security/cve/CVE-2019-7222"
},
{
"category": "external",
"summary": "SUSE Bug 1124735 for CVE-2019-7222",
"url": "https://bugzilla.suse.com/1124735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-7222"
},
{
"cve": "CVE-2019-8564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8564"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8564",
"url": "https://www.suse.com/security/cve/CVE-2019-8564"
},
{
"category": "external",
"summary": "SUSE Bug 1132673 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132673"
},
{
"category": "external",
"summary": "SUSE Bug 1132828 for CVE-2019-8564",
"url": "https://bugzilla.suse.com/1132828"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8564"
},
{
"cve": "CVE-2019-8912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8912"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8912",
"url": "https://www.suse.com/security/cve/CVE-2019-8912"
},
{
"category": "external",
"summary": "SUSE Bug 1125907 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1125907"
},
{
"category": "external",
"summary": "SUSE Bug 1126284 for CVE-2019-8912",
"url": "https://bugzilla.suse.com/1126284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-8912"
},
{
"cve": "CVE-2019-9500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9500"
}
],
"notes": [
{
"category": "general",
"text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9500",
"url": "https://www.suse.com/security/cve/CVE-2019-9500"
},
{
"category": "external",
"summary": "SUSE Bug 1132681 for CVE-2019-9500",
"url": "https://bugzilla.suse.com/1132681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9500"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-10766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10766"
}
],
"notes": [
{
"category": "general",
"text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10766",
"url": "https://www.suse.com/security/cve/CVE-2020-10766"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2020-10766",
"url": "https://bugzilla.suse.com/1172781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10766"
},
{
"cve": "CVE-2020-10767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10767"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10767",
"url": "https://www.suse.com/security/cve/CVE-2020-10767"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2020-10767",
"url": "https://bugzilla.suse.com/1172782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10767"
},
{
"cve": "CVE-2020-10768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10768"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10768",
"url": "https://www.suse.com/security/cve/CVE-2020-10768"
},
{
"category": "external",
"summary": "SUSE Bug 1159281 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1159281"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2020-10768",
"url": "https://bugzilla.suse.com/1172783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10768"
},
{
"cve": "CVE-2020-12351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12351"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12351",
"url": "https://www.suse.com/security/cve/CVE-2020-12351"
},
{
"category": "external",
"summary": "SUSE Bug 1177724 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177724"
},
{
"category": "external",
"summary": "SUSE Bug 1177729 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1177729"
},
{
"category": "external",
"summary": "SUSE Bug 1178397 for CVE-2020-12351",
"url": "https://bugzilla.suse.com/1178397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-12351"
},
{
"cve": "CVE-2020-12352",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12352"
}
],
"notes": [
{
"category": "general",
"text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12352",
"url": "https://www.suse.com/security/cve/CVE-2020-12352"
},
{
"category": "external",
"summary": "SUSE Bug 1177725 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1177725"
},
{
"category": "external",
"summary": "SUSE Bug 1178398 for CVE-2020-12352",
"url": "https://bugzilla.suse.com/1178398"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12352"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14386"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14386",
"url": "https://www.suse.com/security/cve/CVE-2020-14386"
},
{
"category": "external",
"summary": "SUSE Bug 1176069 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176069"
},
{
"category": "external",
"summary": "SUSE Bug 1176072 for CVE-2020-14386",
"url": "https://bugzilla.suse.com/1176072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14386"
},
{
"cve": "CVE-2020-24586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24586"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24586",
"url": "https://www.suse.com/security/cve/CVE-2020-24586"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24586",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24586"
},
{
"cve": "CVE-2020-24587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24587"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24587",
"url": "https://www.suse.com/security/cve/CVE-2020-24587"
},
{
"category": "external",
"summary": "SUSE Bug 1185859 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185859"
},
{
"category": "external",
"summary": "SUSE Bug 1185862 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1185862"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24587",
"url": "https://bugzilla.suse.com/1192868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24587"
},
{
"cve": "CVE-2020-24588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24588"
}
],
"notes": [
{
"category": "general",
"text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24588",
"url": "https://www.suse.com/security/cve/CVE-2020-24588"
},
{
"category": "external",
"summary": "SUSE Bug 1185861 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1185861"
},
{
"category": "external",
"summary": "SUSE Bug 1192868 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1192868"
},
{
"category": "external",
"summary": "SUSE Bug 1199701 for CVE-2020-24588",
"url": "https://bugzilla.suse.com/1199701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24588"
},
{
"cve": "CVE-2020-25639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25639"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25639",
"url": "https://www.suse.com/security/cve/CVE-2020-25639"
},
{
"category": "external",
"summary": "SUSE Bug 1176846 for CVE-2020-25639",
"url": "https://bugzilla.suse.com/1176846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25639"
},
{
"cve": "CVE-2020-25656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25656",
"url": "https://www.suse.com/security/cve/CVE-2020-25656"
},
{
"category": "external",
"summary": "SUSE Bug 1177766 for CVE-2020-25656",
"url": "https://bugzilla.suse.com/1177766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25656"
},
{
"cve": "CVE-2020-25668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25668"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25668",
"url": "https://www.suse.com/security/cve/CVE-2020-25668"
},
{
"category": "external",
"summary": "SUSE Bug 1178123 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178123"
},
{
"category": "external",
"summary": "SUSE Bug 1178622 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1178622"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-25668",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25668"
},
{
"cve": "CVE-2020-26141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26141"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26141",
"url": "https://www.suse.com/security/cve/CVE-2020-26141"
},
{
"category": "external",
"summary": "SUSE Bug 1185987 for CVE-2020-26141",
"url": "https://bugzilla.suse.com/1185987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-26141"
},
{
"cve": "CVE-2020-2732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2732",
"url": "https://www.suse.com/security/cve/CVE-2020-2732"
},
{
"category": "external",
"summary": "SUSE Bug 1163971 for CVE-2020-2732",
"url": "https://bugzilla.suse.com/1163971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2732"
},
{
"cve": "CVE-2020-29660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29660"
}
],
"notes": [
{
"category": "general",
"text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29660",
"url": "https://www.suse.com/security/cve/CVE-2020-29660"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29660",
"url": "https://bugzilla.suse.com/1179877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29660"
},
{
"cve": "CVE-2020-29661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29661"
}
],
"notes": [
{
"category": "general",
"text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29661",
"url": "https://www.suse.com/security/cve/CVE-2020-29661"
},
{
"category": "external",
"summary": "SUSE Bug 1179745 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179745"
},
{
"category": "external",
"summary": "SUSE Bug 1179877 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1179877"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2020-29661",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29661"
},
{
"cve": "CVE-2020-8648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8648"
}
],
"notes": [
{
"category": "general",
"text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8648",
"url": "https://www.suse.com/security/cve/CVE-2020-8648"
},
{
"category": "external",
"summary": "SUSE Bug 1162928 for CVE-2020-8648",
"url": "https://bugzilla.suse.com/1162928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8694"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8694",
"url": "https://www.suse.com/security/cve/CVE-2020-8694"
},
{
"category": "external",
"summary": "SUSE Bug 1170415 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170415"
},
{
"category": "external",
"summary": "SUSE Bug 1170446 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1170446"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178700 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1178700"
},
{
"category": "external",
"summary": "SUSE Bug 1179661 for CVE-2020-8694",
"url": "https://bugzilla.suse.com/1179661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-8694"
},
{
"cve": "CVE-2021-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-23133"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-23133",
"url": "https://www.suse.com/security/cve/CVE-2021-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1184675 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1184675"
},
{
"category": "external",
"summary": "SUSE Bug 1185901 for CVE-2021-23133",
"url": "https://bugzilla.suse.com/1185901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-23133"
},
{
"cve": "CVE-2021-26708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26708"
}
],
"notes": [
{
"category": "general",
"text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26708",
"url": "https://www.suse.com/security/cve/CVE-2021-26708"
},
{
"category": "external",
"summary": "SUSE Bug 1181806 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1181806"
},
{
"category": "external",
"summary": "SUSE Bug 1183298 for CVE-2021-26708",
"url": "https://bugzilla.suse.com/1183298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-26708"
},
{
"cve": "CVE-2021-28971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28971"
}
],
"notes": [
{
"category": "general",
"text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28971",
"url": "https://www.suse.com/security/cve/CVE-2021-28971"
},
{
"category": "external",
"summary": "SUSE Bug 1184196 for CVE-2021-28971",
"url": "https://bugzilla.suse.com/1184196"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28971"
},
{
"cve": "CVE-2021-32606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-32606"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-32606",
"url": "https://www.suse.com/security/cve/CVE-2021-32606"
},
{
"category": "external",
"summary": "SUSE Bug 1185953 for CVE-2021-32606",
"url": "https://bugzilla.suse.com/1185953"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-32606"
},
{
"cve": "CVE-2021-33909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33909"
}
],
"notes": [
{
"category": "general",
"text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33909",
"url": "https://www.suse.com/security/cve/CVE-2021-33909"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188063"
},
{
"category": "external",
"summary": "SUSE Bug 1188257 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1188257"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1190859 for CVE-2021-33909",
"url": "https://bugzilla.suse.com/1190859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-3483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3483"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3483",
"url": "https://www.suse.com/security/cve/CVE-2021-3483"
},
{
"category": "external",
"summary": "SUSE Bug 1184393 for CVE-2021-3483",
"url": "https://bugzilla.suse.com/1184393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3483"
},
{
"cve": "CVE-2021-3489",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3489"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3489",
"url": "https://www.suse.com/security/cve/CVE-2021-3489"
},
{
"category": "external",
"summary": "SUSE Bug 1185640 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185640"
},
{
"category": "external",
"summary": "SUSE Bug 1185856 for CVE-2021-3489",
"url": "https://bugzilla.suse.com/1185856"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3489"
},
{
"cve": "CVE-2021-3490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3490"
}
],
"notes": [
{
"category": "general",
"text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3490",
"url": "https://www.suse.com/security/cve/CVE-2021-3490"
},
{
"category": "external",
"summary": "SUSE Bug 1185641 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185641"
},
{
"category": "external",
"summary": "SUSE Bug 1185796 for CVE-2021-3490",
"url": "https://bugzilla.suse.com/1185796"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3490"
},
{
"cve": "CVE-2021-3491",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3491"
}
],
"notes": [
{
"category": "general",
"text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3491",
"url": "https://www.suse.com/security/cve/CVE-2021-3491"
},
{
"category": "external",
"summary": "SUSE Bug 1185642 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1185642"
},
{
"category": "external",
"summary": "SUSE Bug 1187090 for CVE-2021-3491",
"url": "https://bugzilla.suse.com/1187090"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3491"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3759"
}
],
"notes": [
{
"category": "general",
"text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3759",
"url": "https://www.suse.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "SUSE Bug 1190115 for CVE-2021-3759",
"url": "https://bugzilla.suse.com/1190115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-38166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38166"
}
],
"notes": [
{
"category": "general",
"text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38166",
"url": "https://www.suse.com/security/cve/CVE-2021-38166"
},
{
"category": "external",
"summary": "SUSE Bug 1189233 for CVE-2021-38166",
"url": "https://bugzilla.suse.com/1189233"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-38166"
},
{
"cve": "CVE-2021-43976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43976",
"url": "https://www.suse.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "SUSE Bug 1192847 for CVE-2021-43976",
"url": "https://bugzilla.suse.com/1192847"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-43976"
},
{
"cve": "CVE-2022-0185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0185"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0185",
"url": "https://www.suse.com/security/cve/CVE-2022-0185"
},
{
"category": "external",
"summary": "SUSE Bug 1194517 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194517"
},
{
"category": "external",
"summary": "SUSE Bug 1194737 for CVE-2022-0185",
"url": "https://bugzilla.suse.com/1194737"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0185"
},
{
"cve": "CVE-2022-0330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0330"
}
],
"notes": [
{
"category": "general",
"text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0330",
"url": "https://www.suse.com/security/cve/CVE-2022-0330"
},
{
"category": "external",
"summary": "SUSE Bug 1194880 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1194880"
},
{
"category": "external",
"summary": "SUSE Bug 1195950 for CVE-2022-0330",
"url": "https://bugzilla.suse.com/1195950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0330"
},
{
"cve": "CVE-2022-0847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0847"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0847",
"url": "https://www.suse.com/security/cve/CVE-2022-0847"
},
{
"category": "external",
"summary": "SUSE Bug 1196584 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196584"
},
{
"category": "external",
"summary": "SUSE Bug 1196601 for CVE-2022-0847",
"url": "https://bugzilla.suse.com/1196601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0847"
},
{
"cve": "CVE-2022-0886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0886"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0886",
"url": "https://www.suse.com/security/cve/CVE-2022-0886"
},
{
"category": "external",
"summary": "SUSE Bug 1197131 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197131"
},
{
"category": "external",
"summary": "SUSE Bug 1197133 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197133"
},
{
"category": "external",
"summary": "SUSE Bug 1197462 for CVE-2022-0886",
"url": "https://bugzilla.suse.com/1197462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0886"
},
{
"cve": "CVE-2022-1462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1462"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1462",
"url": "https://www.suse.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "SUSE Bug 1198829 for CVE-2022-1462",
"url": "https://bugzilla.suse.com/1198829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1852"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1852",
"url": "https://www.suse.com/security/cve/CVE-2022-1852"
},
{
"category": "external",
"summary": "SUSE Bug 1199875 for CVE-2022-1852",
"url": "https://bugzilla.suse.com/1199875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1972"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1972",
"url": "https://www.suse.com/security/cve/CVE-2022-1972"
},
{
"category": "external",
"summary": "SUSE Bug 1200019 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "external",
"summary": "SUSE Bug 1200266 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1972"
},
{
"cve": "CVE-2022-1973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1973"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1973",
"url": "https://www.suse.com/security/cve/CVE-2022-1973"
},
{
"category": "external",
"summary": "SUSE Bug 1200023 for CVE-2022-1973",
"url": "https://bugzilla.suse.com/1200023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1973"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2308"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2308",
"url": "https://www.suse.com/security/cve/CVE-2022-2308"
},
{
"category": "external",
"summary": "SUSE Bug 1202573 for CVE-2022-2308",
"url": "https://bugzilla.suse.com/1202573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2308"
},
{
"cve": "CVE-2022-24958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-24958"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-24958",
"url": "https://www.suse.com/security/cve/CVE-2022-24958"
},
{
"category": "external",
"summary": "SUSE Bug 1195905 for CVE-2022-24958",
"url": "https://bugzilla.suse.com/1195905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-24958"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2590"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2590",
"url": "https://www.suse.com/security/cve/CVE-2022-2590"
},
{
"category": "external",
"summary": "SUSE Bug 1202013 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202013"
},
{
"category": "external",
"summary": "SUSE Bug 1202089 for CVE-2022-2590",
"url": "https://bugzilla.suse.com/1202089"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2590"
},
{
"cve": "CVE-2022-26490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26490"
}
],
"notes": [
{
"category": "general",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26490",
"url": "https://www.suse.com/security/cve/CVE-2022-26490"
},
{
"category": "external",
"summary": "SUSE Bug 1196830 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "external",
"summary": "SUSE Bug 1201656 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201656"
},
{
"category": "external",
"summary": "SUSE Bug 1201969 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201969"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-28388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28388"
}
],
"notes": [
{
"category": "general",
"text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28388",
"url": "https://www.suse.com/security/cve/CVE-2022-28388"
},
{
"category": "external",
"summary": "SUSE Bug 1198032 for CVE-2022-28388",
"url": "https://bugzilla.suse.com/1198032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28388"
},
{
"cve": "CVE-2022-28389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28389"
}
],
"notes": [
{
"category": "general",
"text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28389",
"url": "https://www.suse.com/security/cve/CVE-2022-28389"
},
{
"category": "external",
"summary": "SUSE Bug 1198033 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1198033"
},
{
"category": "external",
"summary": "SUSE Bug 1201657 for CVE-2022-28389",
"url": "https://bugzilla.suse.com/1201657"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-28389"
},
{
"cve": "CVE-2022-28390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28390"
}
],
"notes": [
{
"category": "general",
"text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28390",
"url": "https://www.suse.com/security/cve/CVE-2022-28390"
},
{
"category": "external",
"summary": "SUSE Bug 1198031 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1198031"
},
{
"category": "external",
"summary": "SUSE Bug 1201517 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1201517"
},
{
"category": "external",
"summary": "SUSE Bug 1207969 for CVE-2022-28390",
"url": "https://bugzilla.suse.com/1207969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-28390"
},
{
"cve": "CVE-2022-28893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28893"
}
],
"notes": [
{
"category": "general",
"text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28893",
"url": "https://www.suse.com/security/cve/CVE-2022-28893"
},
{
"category": "external",
"summary": "SUSE Bug 1198330 for CVE-2022-28893",
"url": "https://bugzilla.suse.com/1198330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-28893"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-29968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29968"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29968",
"url": "https://www.suse.com/security/cve/CVE-2022-29968"
},
{
"category": "external",
"summary": "SUSE Bug 1199087 for CVE-2022-29968",
"url": "https://bugzilla.suse.com/1199087"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-29968"
},
{
"cve": "CVE-2022-3424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3424"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3424",
"url": "https://www.suse.com/security/cve/CVE-2022-3424"
},
{
"category": "external",
"summary": "SUSE Bug 1204166 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204166"
},
{
"category": "external",
"summary": "SUSE Bug 1204167 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1204167"
},
{
"category": "external",
"summary": "SUSE Bug 1208044 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1208044"
},
{
"category": "external",
"summary": "SUSE Bug 1212309 for CVE-2022-3424",
"url": "https://bugzilla.suse.com/1212309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3628"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3628",
"url": "https://www.suse.com/security/cve/CVE-2022-3628"
},
{
"category": "external",
"summary": "SUSE Bug 1204868 for CVE-2022-3628",
"url": "https://bugzilla.suse.com/1204868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3640"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3640",
"url": "https://www.suse.com/security/cve/CVE-2022-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1204619 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204619"
},
{
"category": "external",
"summary": "SUSE Bug 1204624 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1204624"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-3640",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-3640"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-41218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41218"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41218",
"url": "https://www.suse.com/security/cve/CVE-2022-41218"
},
{
"category": "external",
"summary": "SUSE Bug 1202960 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1202960"
},
{
"category": "external",
"summary": "SUSE Bug 1203606 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1203606"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41218",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-41674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-41674",
"url": "https://www.suse.com/security/cve/CVE-2022-41674"
},
{
"category": "external",
"summary": "SUSE Bug 1203770 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203770"
},
{
"category": "external",
"summary": "SUSE Bug 1203994 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1203994"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-41674",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-42719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42719"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42719",
"url": "https://www.suse.com/security/cve/CVE-2022-42719"
},
{
"category": "external",
"summary": "SUSE Bug 1204051 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204051"
},
{
"category": "external",
"summary": "SUSE Bug 1204292 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1204292"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42719",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42720"
}
],
"notes": [
{
"category": "general",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42720",
"url": "https://www.suse.com/security/cve/CVE-2022-42720"
},
{
"category": "external",
"summary": "SUSE Bug 1204059 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204059"
},
{
"category": "external",
"summary": "SUSE Bug 1204291 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1204291"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42720",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42721"
}
],
"notes": [
{
"category": "general",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42721",
"url": "https://www.suse.com/security/cve/CVE-2022-42721"
},
{
"category": "external",
"summary": "SUSE Bug 1204060 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204060"
},
{
"category": "external",
"summary": "SUSE Bug 1204290 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1204290"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42721",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-42722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-42722",
"url": "https://www.suse.com/security/cve/CVE-2022-42722"
},
{
"category": "external",
"summary": "SUSE Bug 1204125 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204125"
},
{
"category": "external",
"summary": "SUSE Bug 1204289 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1204289"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-42722",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-4379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-4379"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-4379",
"url": "https://www.suse.com/security/cve/CVE-2022-4379"
},
{
"category": "external",
"summary": "SUSE Bug 1206209 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206209"
},
{
"category": "external",
"summary": "SUSE Bug 1206373 for CVE-2022-4379",
"url": "https://bugzilla.suse.com/1206373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-4379"
},
{
"cve": "CVE-2022-44032",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44032"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44032",
"url": "https://www.suse.com/security/cve/CVE-2022-44032"
},
{
"category": "external",
"summary": "SUSE Bug 1204894 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1204894"
},
{
"category": "external",
"summary": "SUSE Bug 1212290 for CVE-2022-44032",
"url": "https://bugzilla.suse.com/1212290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44032"
},
{
"cve": "CVE-2022-44033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44033"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44033",
"url": "https://www.suse.com/security/cve/CVE-2022-44033"
},
{
"category": "external",
"summary": "SUSE Bug 1204922 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1204922"
},
{
"category": "external",
"summary": "SUSE Bug 1212306 for CVE-2022-44033",
"url": "https://bugzilla.suse.com/1212306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44033"
},
{
"cve": "CVE-2022-44034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-44034"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-44034",
"url": "https://www.suse.com/security/cve/CVE-2022-44034"
},
{
"category": "external",
"summary": "SUSE Bug 1204901 for CVE-2022-44034",
"url": "https://bugzilla.suse.com/1204901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-44034"
},
{
"cve": "CVE-2022-45884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45884"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45884",
"url": "https://www.suse.com/security/cve/CVE-2022-45884"
},
{
"category": "external",
"summary": "SUSE Bug 1205756 for CVE-2022-45884",
"url": "https://bugzilla.suse.com/1205756"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45885"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45885",
"url": "https://www.suse.com/security/cve/CVE-2022-45885"
},
{
"category": "external",
"summary": "SUSE Bug 1205758 for CVE-2022-45885",
"url": "https://bugzilla.suse.com/1205758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45886"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45886",
"url": "https://www.suse.com/security/cve/CVE-2022-45886"
},
{
"category": "external",
"summary": "SUSE Bug 1205760 for CVE-2022-45886",
"url": "https://bugzilla.suse.com/1205760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45887"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45887",
"url": "https://www.suse.com/security/cve/CVE-2022-45887"
},
{
"category": "external",
"summary": "SUSE Bug 1205762 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1205762"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2022-45887",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45888"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45888",
"url": "https://www.suse.com/security/cve/CVE-2022-45888"
},
{
"category": "external",
"summary": "SUSE Bug 1205764 for CVE-2022-45888",
"url": "https://bugzilla.suse.com/1205764"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45888"
},
{
"cve": "CVE-2022-45919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45919"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45919",
"url": "https://www.suse.com/security/cve/CVE-2022-45919"
},
{
"category": "external",
"summary": "SUSE Bug 1205803 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1205803"
},
{
"category": "external",
"summary": "SUSE Bug 1208600 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208600"
},
{
"category": "external",
"summary": "SUSE Bug 1208912 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208912"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45934"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45934",
"url": "https://www.suse.com/security/cve/CVE-2022-45934"
},
{
"category": "external",
"summary": "SUSE Bug 1205796 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1205796"
},
{
"category": "external",
"summary": "SUSE Bug 1212292 for CVE-2022-45934",
"url": "https://bugzilla.suse.com/1212292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2023-0045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0045"
}
],
"notes": [
{
"category": "general",
"text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0045",
"url": "https://www.suse.com/security/cve/CVE-2023-0045"
},
{
"category": "external",
"summary": "SUSE Bug 1207773 for CVE-2023-0045",
"url": "https://bugzilla.suse.com/1207773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-1076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1076"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1076",
"url": "https://www.suse.com/security/cve/CVE-2023-1076"
},
{
"category": "external",
"summary": "SUSE Bug 1208599 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1208599"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-1076",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1078"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1078",
"url": "https://www.suse.com/security/cve/CVE-2023-1078"
},
{
"category": "external",
"summary": "SUSE Bug 1208601 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208601"
},
{
"category": "external",
"summary": "SUSE Bug 1208603 for CVE-2023-1078",
"url": "https://bugzilla.suse.com/1208603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-1078"
},
{
"cve": "CVE-2023-1192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1192"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1192",
"url": "https://www.suse.com/security/cve/CVE-2023-1192"
},
{
"category": "external",
"summary": "SUSE Bug 1208995 for CVE-2023-1192",
"url": "https://bugzilla.suse.com/1208995"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1192"
},
{
"cve": "CVE-2023-1380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1380"
}
],
"notes": [
{
"category": "general",
"text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1380",
"url": "https://www.suse.com/security/cve/CVE-2023-1380"
},
{
"category": "external",
"summary": "SUSE Bug 1209287 for CVE-2023-1380",
"url": "https://bugzilla.suse.com/1209287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2124"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2124",
"url": "https://www.suse.com/security/cve/CVE-2023-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1210498 for CVE-2023-2124",
"url": "https://bugzilla.suse.com/1210498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-31084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-31084"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-31084",
"url": "https://www.suse.com/security/cve/CVE-2023-31084"
},
{
"category": "external",
"summary": "SUSE Bug 1210783 for CVE-2023-31084",
"url": "https://bugzilla.suse.com/1210783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3141"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3141",
"url": "https://www.suse.com/security/cve/CVE-2023-3141"
},
{
"category": "external",
"summary": "SUSE Bug 1212129 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1212129"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3269"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3269",
"url": "https://www.suse.com/security/cve/CVE-2023-3269"
},
{
"category": "external",
"summary": "SUSE Bug 1212395 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1212395"
},
{
"category": "external",
"summary": "SUSE Bug 1213760 for CVE-2023-3269",
"url": "https://bugzilla.suse.com/1213760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-3269"
},
{
"cve": "CVE-2023-39192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39192"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39192",
"url": "https://www.suse.com/security/cve/CVE-2023-39192"
},
{
"category": "external",
"summary": "SUSE Bug 1215858 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1215858"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39192",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-39193"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-39193",
"url": "https://www.suse.com/security/cve/CVE-2023-39193"
},
{
"category": "external",
"summary": "SUSE Bug 1215860 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1215860"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-39193",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-4128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4128"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4128",
"url": "https://www.suse.com/security/cve/CVE-2023-4128"
},
{
"category": "external",
"summary": "SUSE Bug 1214149 for CVE-2023-4128",
"url": "https://bugzilla.suse.com/1214149"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4128"
},
{
"cve": "CVE-2023-4134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4134"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4134",
"url": "https://www.suse.com/security/cve/CVE-2023-4134"
},
{
"category": "external",
"summary": "SUSE Bug 1213971 for CVE-2023-4134",
"url": "https://bugzilla.suse.com/1213971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4134"
},
{
"cve": "CVE-2023-4194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4194"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4194",
"url": "https://www.suse.com/security/cve/CVE-2023-4194"
},
{
"category": "external",
"summary": "SUSE Bug 1214019 for CVE-2023-4194",
"url": "https://bugzilla.suse.com/1214019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4194"
},
{
"cve": "CVE-2023-42753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42753"
}
],
"notes": [
{
"category": "general",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42753",
"url": "https://www.suse.com/security/cve/CVE-2023-42753"
},
{
"category": "external",
"summary": "SUSE Bug 1215150 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1215150"
},
{
"category": "external",
"summary": "SUSE Bug 1218613 for CVE-2023-42753",
"url": "https://bugzilla.suse.com/1218613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42754"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42754",
"url": "https://www.suse.com/security/cve/CVE-2023-42754"
},
{
"category": "external",
"summary": "SUSE Bug 1215467 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1215467"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-42754",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-42756"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-42756",
"url": "https://www.suse.com/security/cve/CVE-2023-42756"
},
{
"category": "external",
"summary": "SUSE Bug 1215767 for CVE-2023-42756",
"url": "https://bugzilla.suse.com/1215767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-42756"
},
{
"cve": "CVE-2023-4623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4623"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4623",
"url": "https://www.suse.com/security/cve/CVE-2023-4623"
},
{
"category": "external",
"summary": "SUSE Bug 1215115 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215115"
},
{
"category": "external",
"summary": "SUSE Bug 1215440 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1215440"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1219698 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1219698"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-4623",
"url": "https://bugzilla.suse.com/1221598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-46813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46813"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46813",
"url": "https://www.suse.com/security/cve/CVE-2023-46813"
},
{
"category": "external",
"summary": "SUSE Bug 1212649 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1212649"
},
{
"category": "external",
"summary": "SUSE Bug 1216896 for CVE-2023-46813",
"url": "https://bugzilla.suse.com/1216896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-46813"
},
{
"cve": "CVE-2023-4881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4881"
}
],
"notes": [
{
"category": "general",
"text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4881",
"url": "https://www.suse.com/security/cve/CVE-2023-4881"
},
{
"category": "external",
"summary": "SUSE Bug 1215221 for CVE-2023-4881",
"url": "https://bugzilla.suse.com/1215221"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-4881"
},
{
"cve": "CVE-2023-5345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-5345"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-5345",
"url": "https://www.suse.com/security/cve/CVE-2023-5345"
},
{
"category": "external",
"summary": "SUSE Bug 1215899 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215899"
},
{
"category": "external",
"summary": "SUSE Bug 1215971 for CVE-2023-5345",
"url": "https://bugzilla.suse.com/1215971"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-5345"
},
{
"cve": "CVE-2023-6606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6606"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6606",
"url": "https://www.suse.com/security/cve/CVE-2023-6606"
},
{
"category": "external",
"summary": "SUSE Bug 1217947 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1217947"
},
{
"category": "external",
"summary": "SUSE Bug 1220015 for CVE-2023-6606",
"url": "https://bugzilla.suse.com/1220015"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-6610"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-6610",
"url": "https://www.suse.com/security/cve/CVE-2023-6610"
},
{
"category": "external",
"summary": "SUSE Bug 1217946 for CVE-2023-6610",
"url": "https://bugzilla.suse.com/1217946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-6610"
}
]
}
opensuse-su-2019:1571-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.1 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11477: A sequence of SACKs may have been crafted by a remote attacker such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586).\n- CVE-2019-11478: It was possible to send a crafted sequence of SACKs which would fragment the TCP retransmission queue. A remote attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. (bsc#1137586)\n- CVE-2019-11479: It was possible to send a crafted sequence of SACKs which would fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due to low mss values. (bsc#1137586)\n- CVE-2019-12819: The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service (bnc#1138291).\n- CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller did not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c (bnc#1138293).\n- CVE-2019-12456: An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c that allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \u0027double fetch\u0027 vulnerability. (bnc#1136922)\n- CVE-2019-12380: An issue was discovered in the efi subsystem in the Linux kernel phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures (bnc#1136598).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424).\n- CVE-2019-10124: An attacker could exploit an issue in the hwpoison implementation to cause a denial of service (BUG). (bsc#1130699)\n- CVE-2019-12382: In the drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c was an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1136586).\n- CVE-2019-11487: The Linux kernel allowed page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bnc#1133190).\n\nThe following non-security bugs were fixed:\n\n- ACPI: Add Hygon Dhyana support ().\n- ACPI: fix menuconfig presentation of ACPI submenu (bsc#1117158).\n- ACPI / property: fix handling of data_nodes in acpi_get_next_subnode() (bsc#1051510).\n- ALSA: firewire-motu: fix destruction of data for isochronous resources (bsc#1051510).\n- ALSA: hda/realtek - Enable micmute LED for Huawei laptops (bsc#1051510).\n- ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops (bsc#1051510).\n- ALSA: hda/realtek - Set default power save node to 0 (bsc#1051510).\n- ALSA: hda/realtek - Update headset mode for ALC256 (bsc#1051510).\n- ALSA: oxfw: allow PCM capture for Stanton SCS.1m (bsc#1051510).\n- arch: arm64: acpi: KABI ginore includes (bsc#1117158 bsc#1134671).\n- arm64: acpi: fix alignment fault in accessing ACPI (bsc#1117158).\n- arm64: Export save_stack_trace_tsk() (jsc#SLE-4214).\n- arm64: fix ACPI dependencies (bsc#1117158).\n- arm64, mm, efi: Account for GICv3 LPI tables in static memblock reserve table (bsc#1117158).\n- arm64/x86: Update config files. Use CONFIG_ARCH_SUPPORTS_ACPI\n- ARM: iop: do not use using 64-bit DMA masks (bsc#1051510).\n- ARM: orion: do not use using 64-bit DMA masks (bsc#1051510).\n- ASoC: cs42xx8: Add regcache mask dirty (bsc#1051510).\n- ASoC: eukrea-tlv320: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: fsl_asrc: Fix the issue about unsupported rate (bsc#1051510).\n- ASoC: fsl_sai: Update is_slave_mode with correct value (bsc#1051510).\n- ASoC: fsl_utils: fix a leaked reference by adding missing of_node_put (bsc#1051510).\n- ASoC: hdmi-codec: unlock the device on startup errors (bsc#1051510).\n- batman-adv: allow updating DAT entry timeouts on incoming ARP Replies (bsc#1051510).\n- bitmap: Add bitmap_alloc(), bitmap_zalloc() and bitmap_free() (jsc#SLE-4797).\n- blk-mq: fix hang caused by freeze/unfreeze sequence (bsc#1128432).\n- block: Do not revalidate bdev of hidden gendisk (bsc#1120091).\n- Bluetooth: Check key sizes only when Secure Simple Pairing is enabled (bsc#1135556).\n- bnx2x: Add support for detection of P2P event packets (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Bump up driver version to 1.713.36 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix spelling mistake \u0027dicline\u0027 -\u003e \u0027decline\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: fix various indentation issues (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Remove set but not used variable \u0027mfw_vn\u0027 (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Replace magic numbers with macro definitions (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Use struct_size() in kzalloc() (bsc#1136498 jsc#SLE-4699).\n- bnx2x: Utilize FW 7.13.11.0 (bsc#1136498 jsc#SLE-4699).\n- bnxt_en: Add device IDs 0x1806 and 0x1752 for 57500 devices (bsc#1137224).\n- bnxt_en: Add support for BCM957504 (bsc#1137224).\n- bnxt_en: Fix aggregation buffer leak under OOM condition (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible BUG() condition when calling pci_disable_msix() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix possible crash in bnxt_hwrm_ring_free() under error conditions (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix statistics context reservation logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Fix uninitialized variable usage in bnxt_rx_pkt() (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Free short FW command HWRM memory in error path in bnxt_init_one() (bsc#1050242).\n- bnxt_en: Improve multicast address setup logic (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Improve multicast address setup logic (networking-stable-19_05_04).\n- bnxt_en: Improve NQ reservations (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Pass correct extended TX port statistics size to firmware (bsc#1134090 jsc#SLE-5954).\n- bnxt_en: Reduce memory usage when running in kdump kernel (bsc#1134090 jsc#SLE-5954).\n- bonding: fix event handling for stacked bonds (networking-stable-19_04_19).\n- bpf: add map_lookup_elem_sys_only for lookups from syscall side (bsc#1083647).\n- bpf: Add missed newline in verifier verbose log (bsc#1056787).\n- bpf, lru: avoid messing with eviction heuristics upon syscall lookup (bsc#1083647).\n- brcmfmac: convert dev_init_lock mutex to completion (bsc#1051510).\n- brcmfmac: fix missing checks for kmemdup (bsc#1051510).\n- brcmfmac: fix NULL pointer derefence during USB disconnect (bsc#1111666).\n- brcmfmac: fix Oops when bringing up interface during USB disconnect (bsc#1051510).\n- brcmfmac: fix race during disconnect when USB completion is in progress (bsc#1051510).\n- brcmfmac: fix WARNING during USB disconnect in case of unempty psq (bsc#1051510).\n- broadcom: Mark expected switch fall-throughs (bsc#1136498 jsc#SLE-4699).\n- btrfs: do not double unlock on error in btrfs_punch_hole (bsc#1136881).\n- btrfs: fix fsync not persisting changed attributes of a directory (bsc#1137151).\n- btrfs: fix race between ranged fsync and writeback of adjacent ranges (bsc#1136477).\n- btrfs: fix race updating log root item during fsync (bsc#1137153).\n- btrfs: fix wrong ctime and mtime of a directory after log replay (bsc#1137152).\n- btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference (bsc#1134806).\n- btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON() (bsc#1133612).\n- btrfs: tree-checker: detect file extent items with overlapping ranges (bsc#1136478).\n- chardev: add additional check for minor range overlap (bsc#1051510).\n- chelsio: use BUG() instead of BUG_ON(1) (bsc#1136345 jsc#SLE-4681).\n- config: arm64: enable CN99xx uncore pmu References: bsc#1117114\n- configfs: Fix use-after-free when accessing sd-\u003es_dentry (bsc#1051510).\n- cpufreq: Add Hygon Dhyana support ().\n- cpufreq: AMD: Ignore the check for ProcFeedback in ST/CZ ().\n- crypto: chcr - ESN for Inline IPSec Tx (bsc#1136353 jsc#SLE-4688).\n- crypto: chcr - small packet Tx stalls the queue (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - avoid using sa_entry imm (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - check set_msg_len overflow in generate_b0 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - cleanup:send addr as value in function argument (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - clean up various indentation issues (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - count incomplete block in IV (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fixed Traffic Stall (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix NULL pointer dereference (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix passing zero to \u0027PTR_ERR\u0027 warning in chcr_aead_op (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix softlockup with heavy I/O (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Fix wrong error counter increments (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Handle PCI shutdown event (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Inline single pdu only (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variable \u0027kctx_len\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - remove set but not used variables \u0027adap\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Reset counters on cxgb4 Detach (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Swap location of AAD and IV sent in WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chelsio - Use same value for both channel in single WR (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove cdev_list_lock (bsc#1136353 jsc#SLE-4688).\n- crypto: chtls - remove set but not used variables \u0027err, adap, request, hws\u0027 (bsc#1136353 jsc#SLE-4688).\n- crypto: prefix header search paths with $(srctree)/ (bsc#1136353 jsc#SLE-4688).\n- crypto: qat - move temp buffers off the stack (jsc#SLE-4818).\n- crypto: qat - no need to check return value of debugfs_create functions (jsc#SLE-4818).\n- crypto: qat - Remove unused goto label (jsc#SLE-4818).\n- crypto: qat - Remove VLA usage (jsc#SLE-4818).\n- crypto: vmx - ghash: do nosimd fallback manually (bsc#1135661, bsc#1137162).\n- crypto: vmx - return correct error code on failed setkey (bsc#1135661, bsc#1137162).\n- cxgb4: Add new T6 PCI device ids 0x608b (bsc#1136345 jsc#SLE-4681).\n- cxgb4: add tcb flags and tcb rpl struct (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Add VF Link state support (bsc#1136345 jsc#SLE-4681).\n- cxgb4/chtls: Prefix adapter flags with CXGB4 (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Display advertised FEC in ethtool (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf: Fix up netdev-\u003ehw_features (bsc#1136345 jsc#SLE-4681).\n- cxgb4/cxgb4vf_main: Mark expected switch fall-through (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Delete all hash and TCAM filters before resource cleanup (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Do not return EAGAIN when TCAM is full (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable hash filter with offload (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Enable outer UDP checksum offload for T6 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Fix error path in cxgb4_init_module (bsc#1136345 jsc#SLE-4681).\n- cxgb4: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4: kfree mhp after the debug print (bsc#1136345 jsc#SLE-4681).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove DEFINE_SIMPLE_DEBUGFS_FILE() (bsc#1136345 jsc#SLE-4681).\n- cxgb4: remove set but not used variables \u0027multitrc, speed\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Revert \u0027cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size\u0027 (bsc#1136345 jsc#SLE-4681).\n- cxgb4: TLS record offload enable (bsc#1136345 jsc#SLE-4681).\n- cxgb4: Update 1.23.3.0 as the latest firmware supported (bsc#1136345 jsc#SLE-4681).\n- cxgb4: use firmware API for validating filter spec (bsc#1136345 jsc#SLE-4681).\n- cxgb4vf: Call netif_carrier_off properly in pci_probe (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Enter debugging mode if FW is inaccessible (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: free mac_hlist properly (bsc#1136345 jsc#SLE-4681).\n- cxgb4vf: Prefix adapter flags with CXGB4VF (bsc#1136347 jsc#SLE-4683).\n- cxgb4vf: Revert force link up behaviour (bsc#1136347 jsc#SLE-4683).\n- dmaengine: at_xdmac: remove BUG_ON macro in tasklet (bsc#1111666).\n- dmaengine: ioat: constify pci_device_id (jsc#SLE-5442).\n- dmaengine: ioatdma: add descriptor pre-fetch support for v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: Add intr_coalesce sysfs entry (jsc#SLE-5442).\n- dmaengine: ioatdma: Add Snow Ridge ioatdma device id (jsc#SLE-5442).\n- dmaengine: ioatdma: disable DCA enabling on IOATDMA v3.4 (jsc#SLE-5442).\n- dmaengine: ioatdma: set the completion address register after channel reset (jsc#SLE-5442).\n- dmaengine: ioatdma: support latency tolerance report (LTR) for v3.4 (jsc#SLE-5442).\n- dmaengine: ioat: do not use DMA_ERROR_CODE (jsc#SLE-5442).\n- dmaengine: ioat: fix prototype of ioat_enumerate_channels (jsc#SLE-5442).\n- dmaengine: pl330: _stop: clear interrupt status (bsc#1111666).\n- dmaengine: Replace WARN_TAINT_ONCE() with pr_warn_once() (jsc#SLE-5442).\n- dmaengine: tegra210-adma: Fix crash during probe (bsc#1111666).\n- dmaengine: tegra210-adma: restore channel status (bsc#1111666).\n- docs: Fix conf.py for Sphinx 2.0 (bsc#1135642).\n- Documentation: Add MDS vulnerability documentation (bsc#1135642).\n- Documentation: Correct the possible MDS sysfs values (bsc#1135642).\n- Documentation: perf: Add documentation for ThunderX2 PMU uncore driver ().\n- drbd: Avoid Clang warning about pointless switch statment (bsc#1051510).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bsc#1051510).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bsc#1051510).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bsc#1051510).\n- drivers: acpi: add dependency of EFI for arm64 (bsc#1117158).\n- drivers/dma/ioat: Remove now-redundant smp_read_barrier_depends() (jsc#SLE-5442).\n- drivers/perf: Add Cavium ThunderX2 SoC UNCORE PMU driver ().\n- drm: add fallback override/firmware EDID modes workaround (bsc#1111666).\n- drm: add non-desktop quirk for Valve HMDs (bsc#1111666).\n- drm: add non-desktop quirks to Sensics and OSVR headsets (bsc#1111666).\n- drm/amd/display: Fix Divide by 0 in memory calculations (bsc#1111666).\n- drm/amd/display: fix releasing planes when exiting odm (bsc#1111666).\n- drm/amd/display: Set stream-\u003emode_changed when connectors change (bsc#1111666).\n- drm/amd/display: Use plane-\u003ecolor_space for dpp if specified (bsc#1111666).\n- drm/amdgpu: fix old fence check in amdgpu_fence_emit (bsc#1051510).\n- drm/amdgpu/psp: move psp version specific function pointers to early_init (bsc#1111666).\n- drm/amdgpu: remove ATPX_DGPU_REQ_POWER_FOR_DISPLAYS check when hotplug-in (bsc#1111666).\n- drm: do not block fb changes for async plane updates (bsc#1111666).\n- drm_dp_cec: add note about good MegaChips 2900 CEC support (bsc#1136978).\n- drm_dp_cec: check that aux has a transfer function (bsc#1136978).\n- drm/drv: Hold ref on parent device during drm_device lifetime (bsc#1051510).\n- drm/edid: abstract override/firmware EDID retrieval (bsc#1111666).\n- drm: etnaviv: avoid DMA API warning when importing buffers (bsc#1111666).\n- drm/etnaviv: lock MMU while dumping core (bsc#1113722)\n- drm/gma500/cdv: Check vbt config bits when detecting lvds panels (bsc#1051510).\n- drm/i915/gvt: add 0x4dfc to gen9 save-restore list (bsc#1113722)\n- drm/i915/gvt: do not let TRTTE and 0x4dfc write passthrough to hardware (bsc#1051510).\n- drm/i915/gvt: Fix cmd length of VEB_DI_IECP (bsc#1113722)\n- drm/i915/gvt: Initialize intel_gvt_gtt_entry in stack (bsc#1111666).\n- drm/i915/gvt: refine ggtt range validation (bsc#1113722)\n- drm/i915/gvt: Tiled Resources mmios are in-context mmios for gen9+ (bsc#1113722)\n- drm/i915: Maintain consistent documentation subsection ordering (bsc#1111666).\n- drm/i915/perf: fix whitelist on Gen10+ (bsc#1051510).\n- drm/i915/sdvo: Implement proper HDMI audio support for SDVO (bsc#1051510).\n- drm/lease: Make sure implicit planes are leased (bsc#1111666).\n- drm/mediatek: call drm_atomic_helper_shutdown() when unbinding driver (bsc#1111666).\n- drm/mediatek: call mtk_dsi_stop() after mtk_drm_crtc_atomic_disable() (bsc#1111666).\n- drm/mediatek: clear num_pipes when unbind driver (bsc#1111666).\n- drm/mediatek: fix unbind functions (bsc#1111666).\n- drm/mediatek: unbind components in mtk_drm_unbind() (bsc#1111666).\n- drm/msm: a5xx: fix possible object reference leak (bsc#1111666).\n- drm/msm: fix fb references in async update (bsc#1111666).\n- drm/nouveau/bar/nv50: ensure BAR is mapped (bsc#1111666).\n- drm/nouveau/disp/dp: respect sink limits when selecting failsafe link configuration (bsc#1051510).\n- drm/nouveau/i2c: Disable i2c bus access after -\u003efini() (bsc#1113722)\n- drm/nouveau/kms/gf119-gp10x: push HeadSetControlOutputResource() mthd when encoders change (bsc#1111666).\n- drm/nouveau/kms/gv100-: fix spurious window immediate interlocks (bsc#1111666).\n- drm/omap: dsi: Fix PM for display blank with paired dss_pll calls (bsc#1111666).\n- drm/panel: otm8009a: Add delay at the end of initialization (bsc#1111666).\n- drm/pl111: fix possible object reference leak (bsc#1111666).\n- drm/radeon: prefer lower reference dividers (bsc#1051510).\n- drm/sun4i: dsi: Change the start delay calculation (bsc#1111666).\n- drm/sun4i: dsi: Enforce boundaries on the start delay (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY clock initialization (bsc#1111666).\n- drm/sun4i: Fix sun8i HDMI PHY configuration for \u003e 148.5 MHz (bsc#1111666).\n- drm/v3d: Handle errors from IRQ setup (bsc#1111666).\n- drm/vmwgfx: Do not send drm sysfs hotplug events on initial master set (bsc#1051510).\n- drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an invalid read (bsc#1051510).\n- drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define() (bsc#1113722)\n- drm: Wake up next in drm_read() chain if we are forced to putback the event (bsc#1051510).\n- dt-bindings: clock: r8a7795: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: clock: r8a7796: Remove CSIREF clock (bsc#1120902).\n- dt-bindings: net: Add binding for the external clock for TI WiLink (bsc#1085535).\n- dt-bindings: rtc: sun6i-rtc: Fix register range in example (bsc#1120902).\n- e1000e: Disable runtime PM on CNP+ (jsc#SLE-4804).\n- e1000e: Exclude device from suspend direct complete optimization (jsc#SLE-4804).\n- e1000e: fix a missing check for return value (jsc#SLE-4804).\n- EDAC, amd64: Add Hygon Dhyana support ().\n- efi: add API to reserve memory persistently across kexec reboot (bsc#1117158).\n- efi/arm: Defer persistent reservations until after paging_init() (bsc#1117158).\n- efi/arm: Do not mark ACPI reclaim memory as MEMBLOCK_NOMAP (bsc#1117158 bsc#1115688 bsc#1120566). Enable NFSv4.2 support - jsc@PM-231 This requires a module parameter for NFSv4.2 to actually be available on SLE12 and SLE15-SP0\n- efi/arm: libstub: add a root memreserve config table (bsc#1117158).\n- efi/arm: map UEFI memory map even w/o runtime services enabled (bsc#1117158).\n- efi/arm: preserve early mapping of UEFI memory map longer for BGRT (bsc#1117158).\n- efi/arm: Revert \u0027Defer persistent reservations until after paging_init()\u0027 (bsc#1117158).\n- efi/arm: Revert deferred unmap of early memmap mapping (bsc#1117158).\n- efi: honour memory reservations passed via a linux specific config table (bsc#1117158).\n- efi: Permit calling efi_mem_reserve_persistent() from atomic context (bsc#1117158).\n- efi: Permit multiple entries in persistent memreserve data structure (bsc#1117158).\n- efi: Prevent GICv3 WARN() by mapping the memreserve table before first use (bsc#1117158).\n- efi: Reduce the amount of memblock reservations for persistent allocations (bsc#1117158).\n- ext4: avoid panic during forced reboot due to aborted journal (bsc#1126356).\n- ext4: fix data corruption caused by overlapping unaligned and aligned IO (bsc#1136428).\n- ext4: make sanity check in mballoc more strict (bsc#1136439).\n- ext4: wait for outstanding dio during truncate in nojournal mode (bsc#1136438).\n- extcon: arizona: Disable mic detect if running when driver is removed (bsc#1051510).\n- fbdev: fix divide error in fb_var_to_videomode (bsc#1113722)\n- fbdev: fix WARNING in __alloc_pages_nodemask bug (bsc#1113722)\n- firmware: efi: factor out mem_reserve (bsc#1117158 bsc#1134671).\n- fm10k: TRIVIAL cleanup of extra spacing in function comment (jsc#SLE-4796).\n- fm10k: use struct_size() in kzalloc() (jsc#SLE-4796).\n- fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback (bsc#1136432).\n- fs/writeback.c: use rcu_barrier() to wait for inflight wb switches going into workqueue when umount (bsc#1136435).\n- ftrace/x86_64: Emulate call function while updating in breakpoint handler (bsc#1099658).\n- fuse: fallocate: fix return with locked inode (bsc#1051510).\n- fuse: fix writepages on 32bit (bsc#1051510).\n- fuse: honor RLIMIT_FSIZE in fuse_file_fallocate (bsc#1051510).\n- gpio: fix gpio-adp5588 build errors (bsc#1051510).\n- gpio: Remove obsolete comment about gpiochip_free_hogs() usage (bsc#1051510).\n- HID: core: move Usage Page concatenation to Main item (bsc#1093389).\n- HID: input: fix a4tech horizontal wheel custom usage (bsc#1137429).\n- HID: logitech-hidpp: change low battery level threshold from 31 to 30 percent (bsc#1051510).\n- HID: logitech-hidpp: use RAP instead of FAP to get the protocol version (bsc#1051510).\n- HID: wacom: Add ability to provide explicit battery status info (bsc#1051510).\n- HID: wacom: Add support for 3rd generation Intuos BT (bsc#1051510).\n- HID: wacom: Add support for Pro Pen slim (bsc#1051510).\n- HID: wacom: convert Wacom custom usages to standard HID usages (bsc#1051510).\n- HID: wacom: Correct button numbering 2nd-gen Intuos Pro over Bluetooth (bsc#1051510).\n- HID: wacom: Do not report anything prior to the tool entering range (bsc#1051510).\n- HID: wacom: Do not set tool type until we\u0027re in range (bsc#1051510).\n- HID: wacom: fix mistake in printk (bsc#1051510).\n- HID: wacom: generic: add the \u0027Report Valid\u0027 usage (bsc#1051510).\n- HID: wacom: generic: Ignore HID_DG_BATTERYSTRENTH == 0 (bsc#1051510).\n- HID: wacom: generic: Leave tool in prox until it completely leaves sense (bsc#1051510).\n- HID: wacom: generic: Refactor generic battery handling (bsc#1051510).\n- HID: wacom: generic: Report AES battery information (bsc#1051510).\n- HID: wacom: generic: Reset events back to zero when pen leaves (bsc#1051510).\n- HID: wacom: generic: Scale battery capacity measurements to percentages (bsc#1051510).\n- HID: wacom: generic: Send BTN_STYLUS3 when both barrel switches are set (bsc#1051510).\n- HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range (bsc#1051510).\n- HID: wacom: generic: Support multiple tools per report (bsc#1051510).\n- HID: wacom: generic: Use generic codepath terminology in wacom_wac_pen_report (bsc#1051510).\n- HID: wacom: Mark expected switch fall-through (bsc#1051510).\n- HID: wacom: Move handling of HID quirks into a dedicated function (bsc#1051510).\n- HID: wacom: Move HID fix for AES serial number into wacom_hid_usage_quirk (bsc#1051510).\n- HID: wacom: Properly handle AES serial number and tool type (bsc#1051510).\n- HID: wacom: Queue events with missing type/serial data for later processing (bsc#1051510).\n- HID: wacom: Remove comparison of u8 mode with zero and simplify (bsc#1051510).\n- HID: wacom: Replace touch_max fixup code with static touch_max definitions (bsc#1051510).\n- HID: wacom: Send BTN_TOUCH in response to INTUOSP2_BT eraser contact (bsc#1051510).\n- HID: wacom: Support \u0027in range\u0027 for Intuos/Bamboo tablets where possible (bsc#1051510).\n- HID: Wacom: switch Dell canvas into highres mode (bsc#1051510).\n- HID: wacom: Sync INTUOSP2_BT touch state after each frame if necessary (bsc#1051510).\n- HID: wacom: wacom_wac_collection() is local to wacom_wac.c (bsc#1051510).\n- HID: wacom: Work around HID descriptor bug in DTK-2451 and DTH-2452 (bsc#1051510).\n- hwmon: (core) add thermal sensors only if dev-\u003eof_node is present (bsc#1051510).\n- hwmon: (pmbus/core) Treat parameters as paged if on multiple pages (bsc#1051510).\n- hwrng: omap - Set default quality (bsc#1051510).\n- i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr (bsc#1051510).\n- i2c: i801: Add support for Intel Comet Lake (jsc#SLE-5331).\n- i2c: synquacer: fix synquacer_i2c_doxfer() return value (bsc#1111666).\n- i40e: Able to add up to 16 MAC filters on an untrusted VF (jsc#SLE-4797).\n- i40e: add new pci id for X710/XXV710 N3000 cards (jsc#SLE-4797).\n- i40e: add num_vectors checker in iwarp handler (jsc#SLE-4797).\n- i40e: Add support FEC configuration for Fortville 25G (jsc#SLE-4797).\n- i40e: Add support for X710 B/P \u0026 SFP+ cards (jsc#SLE-4797).\n- i40e: add tracking of AF_XDP ZC state for each queue pair (jsc#SLE-4797).\n- i40e: change behavior on PF in response to MDD event (jsc#SLE-4797).\n- i40e: Changed maximum supported FW API version to 1.8 (jsc#SLE-4797).\n- i40e: Change unmatched function types (jsc#SLE-4797).\n- i40e: check queue pairs num in config queues handler (jsc#SLE-4797).\n- i40e: clean up several indentation issues (jsc#SLE-4797).\n- i40e: do not allow changes to HW VLAN stripping on active port VLANs (jsc#SLE-4797).\n- i40e: Fix for 10G ports LED not blinking (jsc#SLE-4797).\n- i40e: Fix for allowing too many MDD events on VF (jsc#SLE-4797).\n- i40e: fix i40e_ptp_adjtime when given a negative delta (jsc#SLE-4797).\n- i40e: Fix misleading error message (jsc#SLE-4797).\n- i40e: fix misleading message about promisc setting on un-trusted VF (jsc#SLE-4797).\n- i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c (jsc#SLE-4797).\n- i40e: Fix the typo in adding 40GE KR4 mode (jsc#SLE-4797).\n- i40e: Further implementation of LLDP (jsc#SLE-4797).\n- i40e: Implement DDP support in i40e driver (jsc#SLE-4797).\n- i40e: increase indentation (jsc#SLE-4797).\n- i40e: Introduce recovery mode support (jsc#SLE-4797).\n- i40e: Limiting RSS queues to CPUs (jsc#SLE-4797).\n- i40e: Memory leak in i40e_config_iwarp_qvlist (jsc#SLE-4797).\n- i40e: missing input validation on VF message handling by the PF (jsc#SLE-4797).\n- i40e: move i40e_xsk_umem function (jsc#SLE-4797).\n- i40e: print PCI vendor and device ID during probe (jsc#SLE-4797).\n- i40e: Queues are reserved despite \u0027Invalid argument\u0027 error (jsc#SLE-4797).\n- i40e: remove debugfs tx_timeout support (jsc#SLE-4797).\n- i40e: remove error msg when vf with port vlan tries to remove vlan 0 (jsc#SLE-4797).\n- i40e: Remove misleading messages for untrusted VF (jsc#SLE-4797).\n- i40e: remove out-of-range comparisons in i40e_validate_cloud_filter (jsc#SLE-4797).\n- i40e: Remove umem from VSI (jsc#SLE-4797).\n- i40e: Report advertised link modes on 40GBase_LR4, CR4 and fibre (jsc#SLE-4797).\n- i40e: Report advertised link modes on 40GBASE_SR4 (jsc#SLE-4797).\n- i40e: Revert ShadowRAM checksum calculation change (jsc#SLE-4797).\n- i40e: save PTP time before a device reset (jsc#SLE-4797).\n- i40e: Setting VF to VLAN 0 requires restart (jsc#SLE-4797).\n- i40e: ShadowRAM checksum calculation change (jsc#SLE-4797).\n- i40e: The driver now prints the API version in error message (jsc#SLE-4797).\n- i40e: Update i40e_init_dcb to return correct error (jsc#SLE-4797).\n- i40e: update version number (jsc#SLE-4797).\n- i40e: update version number (jsc#SLE-4797).\n- i40e: Use struct_size() in kzalloc() (jsc#SLE-4797).\n- i40e: VF\u0027s promiscuous attribute is not kept (jsc#SLE-4797).\n- i40e: Wrong truncation from u16 to u8 (jsc#SLE-4797).\n- i40iw: Avoid panic when handling the inetdev event (jsc#SLE-4793).\n- i40iw: remove support for ib_get_vector_affinity (jsc#SLE-4793).\n- i40iw: remove use of VLAN_TAG_PRESENT (jsc#SLE-4793).\n- IB/hfi1: Add debugfs to control expansion ROM write protect (jsc#SLE-4925).\n- IB/hfi1: Add selected Rcv counters (jsc#SLE-4925).\n- IB/hfi1: Close VNIC sdma_progress sleep window (jsc#SLE-4925).\n- IB/hfi1: Consider LMC in 16B/bypass ingress packet check (jsc#SLE-4925).\n- IB/hfi1: Correctly process FECN and BECN in packets (jsc#SLE-4925).\n- IB/hfi1: Dump pio info for non-user send contexts (jsc#SLE-4925).\n- IB/hfi1: Eliminate opcode tests on mr deref (jsc#SLE-4925).\n- IB/hfi1: Failed to drain send queue when QP is put into error state (jsc#SLE-4925).\n- IB/hfi1: Fix the allocation of RSM table (jsc#SLE-4925).\n- IB/hfi1: Fix two format strings (jsc#SLE-4925).\n- IB/hfi1: Fix WQ_MEM_RECLAIM warning (jsc#SLE-4925).\n- IB/hfi1: Ignore LNI errors before DC8051 transitions to Polling state (jsc#SLE-4925).\n- IB/hfi1: Incorrect sizing of sge for PIO will OOPs (jsc#SLE-4925).\n- IB/hfi1: Limit VNIC use of SDMA engines to the available count (jsc#SLE-4925).\n- IB/hfi1: Reduce lock contention on iowait_lock for sdma and pio (jsc#SLE-4925).\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (jsc#SLE-4925).\n- IB/hfi1: Remove WARN_ON when freeing expected receive groups (jsc#SLE-4925).\n- IB/hfi1: Unreserve a reserved request when it is completed (jsc#SLE-4925).\n- IB/hw: Remove unneeded semicolons (bsc#1136456 jsc#SLE-4689).\n- ibmvnic: Add device identification to requested IRQs (bsc#1137739).\n- ibmvnic: Do not close unopened driver during reset (bsc#1137752).\n- ibmvnic: Fix unchecked return codes of memory allocations (bsc#1137752).\n- ibmvnic: Refresh device multicast list after reset (bsc#1137752).\n- ibmvnic: remove set but not used variable \u0027netdev\u0027 (bsc#1137739).\n- IB/rdmavt: Add wc_flags and wc_immdata to cq entry trace (jsc#SLE-4925).\n- IB/rdmavt: Fix frwr memory registration (jsc#SLE-4925).\n- IB/rdmavt: Fix loopback send with invalidate ordering (jsc#SLE-4925).\n- IB/{rdmavt, hfi1): Miscellaneous comment fixes (jsc#SLE-4925).\n- ice: Add 52 byte RSS hash key support (jsc#SLE-4803).\n- ice: add and use new ice_for_each_traffic_class() macro (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 1/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 2/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 3/4 (jsc#SLE-4803).\n- ice: Add code for DCB initialization part 4/4 (jsc#SLE-4803).\n- ice: Add code for DCB rebuild (jsc#SLE-4803).\n- ice: Add code to control FW LLDP and DCBX (jsc#SLE-4803).\n- ice: Add code to get DCB related statistics (jsc#SLE-4803).\n- ice: Add code to process LLDP MIB change events (jsc#SLE-4803).\n- ice: add const qualifier to mac_addr parameter (jsc#SLE-4803).\n- ice: Add ethtool private flag to make forcing link down optional (jsc#SLE-4803).\n- ice: Add ethtool set_phys_id handler (jsc#SLE-4803).\n- ice: Add function to program ethertype based filter rule on VSIs (jsc#SLE-4803).\n- ice: Add missing case in print_link_msg for printing flow control (jsc#SLE-4803).\n- ice: Add missing PHY type to link settings (jsc#SLE-4803).\n- ice: Add more validation in ice_vc_cfg_irq_map_msg (jsc#SLE-4803).\n- ice: Add priority information into VLAN header (jsc#SLE-4803).\n- ice: Add reg_idx variable in ice_q_vector structure (jsc#SLE-4803).\n- ice: Add support for adaptive interrupt moderation (jsc#SLE-4803).\n- ice: Add support for new PHY types (jsc#SLE-4803).\n- ice: Add support for PF/VF promiscuous mode (jsc#SLE-4803).\n- ice: Allow for software timestamping (jsc#SLE-4803).\n- ice: Always free/allocate q_vectors (jsc#SLE-4803).\n- ice: Audit hotpath structures with pahole (jsc#SLE-4803).\n- ice: avoid multiple unnecessary de-references in probe (jsc#SLE-4803).\n- ice: Bump driver version (jsc#SLE-4803).\n- ice: Bump version (jsc#SLE-4803).\n- ice: Calculate ITR increment based on direct calculation (jsc#SLE-4803).\n- ice: change VF VSI tc info along with num_queues (jsc#SLE-4803).\n- ice: check for a leaf node presence (jsc#SLE-4803).\n- ice: clear VF ARQLEN register on reset (jsc#SLE-4803).\n- ice: code cleanup in ice_sched.c (jsc#SLE-4803).\n- ice: configure GLINT_ITR to always have an ITR gran of 2 (jsc#SLE-4803).\n- ice: Configure RSS LUT and HASH KEY in rebuild path (jsc#SLE-4803).\n- ice: Create a generic name for the ice_rx_flg64_bits structure (jsc#SLE-4803).\n- ice: Create framework for VSI queue context (jsc#SLE-4803).\n- ice: Determine descriptor count and ring size based on PAGE_SIZE (jsc#SLE-4803).\n- ice: Disable sniffing VF traffic on PF (jsc#SLE-4803).\n- ice: Do not bail out when filter already exists (jsc#SLE-4803).\n- ice: Do not let VF know that it is untrusted (jsc#SLE-4803).\n- ice: Do not remove VLAN filters that were never programmed (jsc#SLE-4803).\n- ice: Do not set LB_EN for prune switch rules (jsc#SLE-4803).\n- ice: do not spam VFs with link messages (jsc#SLE-4803).\n- ice: Do not unnecessarily initialize local variable (jsc#SLE-4803).\n- ice: Enable LAN_EN for the right recipes (jsc#SLE-4803).\n- ice: Enable link events over the ARQ (jsc#SLE-4803).\n- ice: Enable MAC anti-spoof by default (jsc#SLE-4803).\n- ice: enable VF admin queue interrupts (jsc#SLE-4803).\n- ice : Ensure only valid bits are set in ice_aq_set_phy_cfg (jsc#SLE-4803).\n- ice: Fix added in VSI supported nodes calc (jsc#SLE-4803).\n- ice: Fix broadcast traffic in port VLAN mode (jsc#SLE-4803).\n- ice: Fix for adaptive interrupt moderation (jsc#SLE-4803).\n- ice: Fix for allowing too many MDD events on VF (jsc#SLE-4803).\n- ice: Fix for FC get rx/tx pause params (jsc#SLE-4803).\n- ice: fix ice_remove_rule_internal vsi_list handling (jsc#SLE-4803).\n- ice: Fix incorrect use of abbreviations (jsc#SLE-4803).\n- ice: Fix issue reclaiming resources back to the pool after reset (jsc#SLE-4803).\n- ice: Fix issue reconfiguring VF queues (jsc#SLE-4803).\n- ice: Fix issue when adding more than allowed VLANs (jsc#SLE-4803).\n- ice: fix issue where host reboots on unload when iommu=on (jsc#SLE-4803).\n- ice: Fix issue with VF attempt to delete default MAC address (jsc#SLE-4803).\n- ice: Fix issue with VF reset and multiple VFs support on PFs (jsc#SLE-4803).\n- ice: fix numeric overflow warning (jsc#SLE-4803).\n- ice: fix overlong string, update stats output (jsc#SLE-4803).\n- ice: fix some function prototype and signature style issues (jsc#SLE-4803).\n- ice: fix stack hogs from struct ice_vsi_ctx structures (jsc#SLE-4803).\n- ice: fix static analysis warnings (jsc#SLE-4803).\n- ice: Fix the calculation of ICE_MAX_MTU (jsc#SLE-4803).\n- ice: fix the divide by zero issue (jsc#SLE-4803).\n- ice: Fix typos in code comments (jsc#SLE-4803).\n- ice: flush Tx pipe on disable queue timeout (jsc#SLE-4803).\n- ice: Gather the rx buf clean-up logic for better reuse (jsc#SLE-4803).\n- ice: Get resources per function (jsc#SLE-4803).\n- ice: Get rid of ice_pull_tail (jsc#SLE-4803).\n- ice: Get VF VSI instances directly via PF (jsc#SLE-4803).\n- ice: Implement flow to reset VFs with PFR and other resets (jsc#SLE-4803).\n- ice: Implement getting and setting ethtool coalesce (jsc#SLE-4803).\n- ice: Implement pci_error_handler ops (jsc#SLE-4803).\n- ice: Implement support for normal get_eeprom[_len] ethtool ops (jsc#SLE-4803).\n- ice: Introduce bulk update for page count (jsc#SLE-4803).\n- ice: Limit the ice_add_rx_frag to frag addition (jsc#SLE-4803).\n- ice: map Rx buffer pages with DMA attributes (jsc#SLE-4803).\n- ice: Move aggregator list into ice_hw instance (jsc#SLE-4803).\n- ice: Offload SCTP checksum (jsc#SLE-4803).\n- ice: only use the VF for ICE_VSI_VF in ice_vsi_release (jsc#SLE-4803).\n- ice: Preserve VLAN Rx stripping settings (jsc#SLE-4803).\n- ice: Prevent unintended multiple chain resets (jsc#SLE-4803).\n- ice: Pull out page reuse checks onto separate function (jsc#SLE-4803).\n- ice: Put __ICE_PREPARED_FOR_RESET check in ice_prepare_for_reset (jsc#SLE-4803).\n- ice: Reduce scope of variable in ice_vsi_cfg_rxqs (jsc#SLE-4803).\n- ice: Refactor a few Tx scheduler functions (jsc#SLE-4803).\n- ice: Refactor getting/setting coalesce (jsc#SLE-4803).\n- ice: Refactor link event flow (jsc#SLE-4803).\n- ice: Remove \u00272 BITS\u0027 comment (jsc#SLE-4803).\n- ice: Remove __always_unused attribute (jsc#SLE-4803).\n- ice: remove redundant variable and if condition (jsc#SLE-4803).\n- ice: Remove runtime change of PFINT_OICR_ENA register (jsc#SLE-4803).\n- ice: Remove unnecessary braces (jsc#SLE-4803).\n- ice: Remove unnecessary newlines from log messages (jsc#SLE-4803).\n- ice: Remove unnecessary wait when disabling/enabling Rx queues (jsc#SLE-4803).\n- ice: Remove unused function prototype (jsc#SLE-4803).\n- ice: Remove unused function prototype (jsc#SLE-4803).\n- ice: Remove unused vsi_id field (jsc#SLE-4803).\n- ice: Reset all VFs with VFLR during SR-IOV init flow (jsc#SLE-4803).\n- ice: Resolve static analysis reported issue (jsc#SLE-4803).\n- ice: Restore VLAN switch rule if port VLAN existed before (jsc#SLE-4803).\n- ice: Retrieve rx_buf in separate function (jsc#SLE-4803).\n- ice: Return configuration error without queue to disable (jsc#SLE-4803).\n- ice: Rework queue management code for reuse (jsc#SLE-4803).\n- ice: Separate if conditions for ice_set_features() (jsc#SLE-4803).\n- ice: Set LAN_EN for all directional rules (jsc#SLE-4803).\n- ice: Set physical link up/down when an interface is set up/down (jsc#SLE-4803).\n- ice: sizeof(\u0026lt;type\u003e) should be avoided (jsc#SLE-4803).\n- ice: Suppress false-positive style issues reported by static analyzer (jsc#SLE-4803).\n- ice: Update comment regarding the ITR_GRAN_S (jsc#SLE-4803).\n- ice: Update function header for __ice_vsi_get_qs (jsc#SLE-4803).\n- ice: Update rings based on TC information (jsc#SLE-4803).\n- ice: update VSI config dynamically (jsc#SLE-4803).\n- ice: use absolute vector ID for VFs (jsc#SLE-4803).\n- ice: Use bitfields where possible (jsc#SLE-4803).\n- ice: Use dev_err when ice_cfg_vsi_lan fails (jsc#SLE-4803).\n- ice: Use ice_for_each_q_vector macro where possible (jsc#SLE-4803).\n- ice: use ice_for_each_vsi macro when possible (jsc#SLE-4803).\n- ice: use irq_num var in ice_vsi_req_irq_msix (jsc#SLE-4803).\n- ice: Use more efficient structures (jsc#SLE-4803).\n- ice: Use pf instead of vsi-back (jsc#SLE-4803).\n- ice: use virt channel status codes (jsc#SLE-4803).\n- ice: Validate ring existence and its q_vector per VSI (jsc#SLE-4803).\n- igb: Bump version number (jsc#SLE-4798).\n- igb: Exclude device from suspend direct complete optimization (jsc#SLE-4798).\n- igb: fix various indentation issues (jsc#SLE-4798).\n- igb: Fix WARN_ONCE on runtime suspend (jsc#SLE-4798).\n- igb: use struct_size() helper (jsc#SLE-4798).\n- igc: Add ethtool support (jsc#SLE-4799).\n- igc: Add multiple receive queues control supporting (jsc#SLE-4799).\n- igc: Add support for statistics (jsc#SLE-4799).\n- igc: Add support for the ntuple feature (jsc#SLE-4799).\n- igc: Extend the ethtool supporting (jsc#SLE-4799).\n- igc: Fix code redundancy (jsc#SLE-4799).\n- igc: Fix the typo in igc_base.h header definition (jsc#SLE-4799).\n- igc: Remove the \u0027igc_get_phy_id_base\u0027 method (jsc#SLE-4799).\n- igc: Remove the \u0027igc_read_mac_addr_base\u0027 method (jsc#SLE-4799).\n- igc: Remove unneeded code (jsc#SLE-4799).\n- igc: Remove unneeded hw_dbg prints (jsc#SLE-4799).\n- igc: Remove unreachable code from igc_phy.c file (jsc#SLE-4799).\n- igc: Remove unused code (jsc#SLE-4799).\n- igc: Use struct_size() helper (jsc#SLE-4799).\n- iio: ad_sigma_delta: Properly handle SPI bus locking vs CS assertion (bsc#1051510).\n- iio: common: ssp_sensors: Initialize calculated_time in ssp_common_process_data (bsc#1051510).\n- iio: hmc5843: fix potential NULL pointer dereferences (bsc#1051510).\n- include/linux/bitops.h: introduce BITS_PER_TYPE (bsc#1136345 jsc#SLE-4681).\n- indirect call wrappers: helpers to speed-up indirect calls of builtin (bsc#1124503).\n- infiniband: hfi1: drop crazy DEBUGFS_SEQ_FILE_CREATE() macro (jsc#SLE-4925).\n- infiniband: hfi1: no need to check return value of debugfs_create functions (jsc#SLE-4925).\n- infiniband/qedr: Potential null ptr dereference of qp (bsc#1136456 jsc#SLE-4689).\n- intel: correct return from set features callback (jsc#SLE-4795).\n- iommu/arm-smmu-v3: Abort all transactions if SMMU is enabled in kdump kernel (bsc#1117158).\n- iommu/arm-smmu-v3: Do not disable SMMU in kdump kernel (bsc#1117158 bsc#1134671).\n- ip_gre: fix parsing gre header in ipgre_err (git-fixes).\n- ipv4: add sanity checks in ipv4_link_failure() (git-fixes).\n- ipv4: Define __ipv4_neigh_lookup_noref when CONFIG_INET is disabled (git-fixes).\n- ipv4: ensure rcu_read_lock() in ipv4_link_failure() (networking-stable-19_04_19).\n- ipv4: ip_do_fragment: Preserve skb_iif during fragmentation (networking-stable-19_05_04).\n- ipv4: recompile ip options in ipv4_link_failure (networking-stable-19_04_19).\n- ipv4: set the tcp_min_rtt_wlen range from 0 to one day (networking-stable-19_04_30).\n- ipv6/flowlabel: wait rcu grace period before put_pid() (git-fixes).\n- ipv6: invert flowlabel sharing check in process and user mode (git-fixes).\n- ipvs: call ip_vs_dst_notifier earlier than ipv6_dev_notf (git-fixes).\n- iw_cxgb4: Check for send WR also while posting write with completion WR (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: complete the cached SRQ buffers (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Fix qpid leak (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: fix srqidx leak during connection abort (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: Make function read_tcb() static (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use listening ep tos when accepting new connections (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when finding ipv6 routes (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb4: use tos when importing the endpoint (bsc#1136348 jsc#SLE-4684).\n- iw_cxgb*: kzalloc the iwcm verbs struct (bsc#1136348 jsc#SLE-4684).\n- iwlwifi: mvm: check for length correctness in iwl_mvm_create_skb() (bsc#1051510).\n- iwlwifi: pcie: do not crash on invalid RX interrupt (bsc#1051510).\n- ixgbe: fix mdio bus registration (jsc#SLE-4795).\n- ixgbe: fix older devices that do not support IXGBE_MRQC_L3L4TXSWEN (jsc#SLE-4795).\n- ixgbe: register a mdiobus (jsc#SLE-4795).\n- ixgbe: remove magic constant in ixgbe_reset_hw_82599() (jsc#SLE-4795).\n- ixgbe: use mii_bus to handle MII related ioctls (jsc#SLE-4795).\n- ixgbe: Use struct_size() helper (jsc#SLE-4795).\n- jbd2: check superblock mapped prior to committing (bsc#1136430).\n- kabi: arm64: cpuhotplug: Reuse other arch\u0027s cpuhp_state ().\n- kabi: drop LINUX_MIB_TCPWQUEUETOOBIG snmp counter (bsc#1137586).\n- kabi i40e ignore include (jsc#SLE-4797).\n- kabi: implement map_lookup_elem_sys_only in another way (bsc#1083647).\n- kabi: move sysctl_tcp_min_snd_mss to preserve struct net layout (bsc#1137586).\n- kABI: protect dma-mapping.h include (kabi).\n- kabi protect struct iw_cm_id (bsc#1136348 jsc#SLE-4684).\n- kABI: protect struct pci_dev (kabi).\n- kabi protect struct vf_info (bsc#1136347 jsc#SLE-4683).\n- kabi: s390: enum interruption_class (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- kabi/severities: exclude hns3 symbols (bsc#1134948)\n- kabi/severities: exclude qed* symbols (bsc#1136461)\n- kabi/severities: missed hns roce module\n- kabi/severities: Whitelist airq_iv_* (s390-specific)\n- kabi/severities: Whitelist more s390x internal symbols\n- kabi/severities: Whitelist s390 internal-only symbols\n- kABI workaround for the new pci_dev.skip_bus_pm field addition (bsc#1051510).\n- kernel/signal.c: trace_signal_deliver when signal_group_exit (git-fixes).\n- kernel/sys.c: prctl: fix false positive in validate_prctl_map() (git-fixes).\n- keys: safe concurrent user-\u003e{session,uid}_keyring access (bsc#1135642).\n- KVM: PPC: Book3S HV: Avoid lockdep debugging in TCE realmode handlers (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts (bsc#1061840).\n- KVM: PPC: Book3S: Protect memslots while validating user address (bsc#1061840).\n- KVM: PPC: Release all hardware TCE tables attached to a group (bsc#1061840).\n- KVM: PPC: Remove redundand permission bits removal (bsc#1061840).\n- KVM: PPC: Validate all tces before updating tables (bsc#1061840).\n- KVM: PPC: Validate TCEs against preregistered memory page sizes (bsc#1061840).\n- KVM: s390: fix memory overwrites when not using SCA entries (bsc#1136206).\n- KVM: s390: provide io interrupt kvm_stat (bsc#1136206).\n- KVM: s390: use created_vcpus in more places (bsc#1136206).\n- KVM: s390: vsie: fix \u0026lt; 8k check for the itdba (bsc#1136206).\n- leds: avoid flush_work in atomic context (bsc#1051510).\n- libcxgb: fix incorrect ppmax calculation (bsc#1136345 jsc#SLE-4681).\n- livepatch: Convert error about unsupported reliable stacktrace into a warning (bsc#1071995).\n- livepatch: Remove custom kobject state handling (bsc#1071995).\n- livepatch: Remove duplicated code for early initialization (bsc#1071995).\n- mac80211/cfg80211: update bss channel on channel switch (bsc#1051510).\n- mac80211: Fix kernel panic due to use of txq after free (bsc#1051510).\n- media: au0828: Fix NULL pointer dereference in au0828_analog_stream_enable() (bsc#1051510).\n- media: au0828: stop video streaming only when last user stops (bsc#1051510).\n- media: coda: clear error return value before picture run (bsc#1051510).\n- media: cpia2: Fix use-after-free in cpia2_exit (bsc#1051510).\n- media: go7007: avoid clang frame overflow warning with KASAN (bsc#1051510).\n- media: m88ds3103: serialize reset messages in m88ds3103_set_frontend (bsc#1051510).\n- media: ov2659: make S_FMT succeed even if requested format does not match (bsc#1051510).\n- media: saa7146: avoid high stack usage with clang (bsc#1051510).\n- media: smsusb: better handle optional alignment (bsc#1051510).\n- media: usb: siano: Fix false-positive \u0027uninitialized variable\u0027 warning (bsc#1051510).\n- media: usb: siano: Fix general protection fault in smsusb (bsc#1051510).\n- memcg: make it work on sparse non-0-node systems (bnc#1133616).\n- memcg: make it work on sparse non-0-node systems kabi (bnc#1133616).\n- mfd: da9063: Fix OTP control register names to match datasheets for DA9063/63L (bsc#1051510).\n- mfd: intel-lpss: Set the device in reset state when init (bsc#1051510).\n- mfd: max77620: Fix swapped FPS_PERIOD_MAX_US values (bsc#1051510).\n- mfd: tps65912-spi: Add missing of table registration (bsc#1051510).\n- mfd: twl6040: Fix device init errors for ACCCTL register (bsc#1051510).\n- mlxsw: spectrum: Fix autoneg status in ethtool (networking-stable-19_04_30).\n- mmc: block: Delete gendisk before cleaning up the request queue (bsc#1127616).\n- mmc: core: make pwrseq_emmc (partially) support sleepy GPIO controllers (bsc#1051510).\n- mmc: core: Verify SD bus width (bsc#1051510).\n- mmc: mmci: Prevent polling for busy detection in IRQ context (bsc#1051510).\n- mmc: sdhci-iproc: cygnus: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-iproc: Set NO_HISPD bit to fix HS50 data hold time problem (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum A-009204 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC5 support (bsc#1051510).\n- mmc: sdhci-of-esdhc: add erratum eSDHC-A001 and A-008358 support (bsc#1051510).\n- mmc_spi: add a status check for spi_sync_locked (bsc#1051510).\n- mm-Fix-modifying-of-page-protection-by-insert_pfn.patch: Fix buggy backport leading to MAP_SYNC failures (bsc#1137372)\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- mount: copy the port field into the cloned nfs_server structure (bsc#1136990).\n- mtd: spi-nor: intel-spi: Add support for Intel Ice Lake SPI serial flash (jsc#SLE-5358).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1136935).\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor\n- neighbor: Call __ipv4_neigh_lookup_noref in neigh_xmit (git-fixes).\n- net: atm: Fix potential Spectre v1 vulnerabilities (networking-stable-19_04_19).\n- net: chelsio: Add a missing check on cudg_get_buffer (bsc#1136345 jsc#SLE-4681).\n- net: cxgb4: fix various indentation issues (bsc#1136345 jsc#SLE-4681).\n- net: do not keep lonely packets forever in the gro hash (git-fixes).\n- net: dsa: bcm_sf2: fix buffer overflow doing set_rxnfc (networking-stable-19_05_04).\n- net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT (git-fixes).\n- net: ena: fix return value of ena_com_config_llq_info() (bsc#1111696 bsc#1117561).\n- netfilter: ebtables: CONFIG_COMPAT: reject trailing data after last rule (git-fixes).\n- netfilter: ipset: do not call ipset_nest_end after nla_nest_cancel (git-fixes).\n- netfilter: nf_tables: fix leaking object reference count (git-fixes).\n- netfilter: nft_compat: do not dump private area (git-fixes).\n- net: fou: do not use guehdr after iptunnel_pull_offloads in gue_udp_recv (networking-stable-19_04_19).\n- net: hns3: add counter for times RX pages gets allocated (bsc#1104353 bsc#1134947).\n- net: hns3: add error handler for initializing command queue (bsc#1104353 bsc#1135058).\n- net: hns3: add function type check for debugfs help information (bsc#1104353 bsc#1134980).\n- net: hns3: Add handling of MAC tunnel interruption (bsc#1104353 bsc#1134983).\n- net: hns3: add hns3_gro_complete for HW GRO process (bsc#1104353 bsc#1135051).\n- net: hns3: add linearizing checking for TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: add protect when handling mac addr list (bsc#1104353 ).\n- net: hns3: add queue\u0027s statistics update to service task (bsc#1104353 bsc#1134981).\n- net: hns3: add reset statistics for VF (bsc#1104353 bsc#1134995).\n- net: hns3: add reset statistics info for PF (bsc#1104353 bsc#1134995).\n- net: hns3: add some debug info for hclgevf_get_mbx_resp() (bsc#1104353 bsc#1134994).\n- net: hns3: add some debug information for hclge_check_event_cause (bsc#1104353 bsc#1134994).\n- net: hns3: add support for dump ncl config by debugfs (bsc#1104353 bsc#1134987).\n- net: hns3: Add support for netif message level settings (bsc#1104353 bsc#1134989).\n- net: hns3: adjust the timing of hns3_client_stop when unloading (bsc#1104353 bsc#1137201).\n- net: hns3: always assume no drop TC for performance reason (bsc#1104353 bsc#1135049).\n- net: hns3: check 1000M half for hns3_ethtool_ops.set_link_ksettings (bsc#1104353 bsc#1137201).\n- net: hns3: check resetting status in hns3_get_stats() (bsc#1104353 bsc#1137201).\n- net: hns3: code optimization for command queue\u0027 spin lock (bsc#1104353 bsc#1135042).\n- net: hns3: combine len and checksum handling for inner and outer header (bsc#1104353 bsc#1134947).\n- net: hns3: deactive the reset timer when reset successfully (bsc#1104353 bsc#1137201).\n- net: hns3: divide shared buffer between TC (bsc#1104353 bsc#1135047).\n- net: hns3: do not initialize MDIO bus when PHY is inexistent (bsc#1104353 bsc#1135045).\n- net: hns3: do not request reset when hardware resetting (bsc#1104353 bsc#1137201).\n- net: hns3: dump more information when tx timeout happens (bsc#1104353 bsc#1134990).\n- net: hns3: extend the loopback state acquisition time (bsc#1104353).\n- net: hns3: fix data race between ring-\u003enext_to_clean (bsc#1104353 bsc#1134975 bsc#1134945).\n- net: hns3: fix error handling for desc filling (bsc#1104353 ).\n- net: hns3: fix for HNS3_RXD_GRO_SIZE_M macro (bsc#1104353 bsc#1137201).\n- net: hns3: fix for tunnel type handling in hns3_rx_checksum (bsc#1104353 bsc#1134946).\n- net: hns3: fix for TX clean num when cleaning TX BD (bsc#1104353 ).\n- net: hns3: fix for vport-\u003ebw_limit overflow problem (bsc#1104353 bsc#1134998).\n- net: hns3: fix keep_alive_timer not stop problem (bsc#1104353 bsc#1135055).\n- net: hns3: fix loop condition of hns3_get_tx_timeo_queue_info() (bsc#1104353 bsc#1134990).\n- net: hns3: fix pause configure fail problem (bsc#1104353 bsc#1134951 bsc#1134951).\n- net: hns3: fix set port based VLAN for PF (bsc#1104353 bsc#1135053).\n- net: hns3: fix set port based VLAN issue for VF (bsc#1104353 bsc#1135053).\n- net: hns3: fix sparse: warning when calling hclge_set_vlan_filter_hw() (bsc#1104353 bsc#1134999).\n- net: hns3: fix VLAN offload handle for VLAN inserted by port (bsc#1104353 bsc#1135053).\n- net: hns3: free the pending skb when clean RX ring (bsc#1104353 bsc#1135044).\n- net: hns3: handle pending reset while reset fail (bsc#1104353 bsc#1135058).\n- net: hns3: handle the BD info on the last BD of the packet (bsc#1104353 bsc#1134974).\n- net: hns3: ignore lower-level new coming reset (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclge_destroy_cmd_queue static (bsc#1104353 bsc#1137201).\n- net: hns3: Make hclgevf_update_link_mode static (bsc#1104353 bsc#1137201).\n- net: hns3: minor optimization for datapath (bsc#1104353 ).\n- net: hns3: minor optimization for ring_space (bsc#1104353 ).\n- net: hns3: minor refactor for hns3_rx_checksum (bsc#1104353 bsc#1135052).\n- net: hns3: modify HNS3_NIC_STATE_INITED flag in hns3_reset_notify_uninit_enet (bsc#1104353).\n- net: hns3: modify the VF network port media type acquisition method (bsc#1104353 bsc#1137201).\n- net: hns3: modify VLAN initialization to be compatible with port based VLAN (bsc#1104353 bsc#1135053).\n- net: hns3: not reset TQP in the DOWN while VF resetting (bsc#1104353 bsc#1134952).\n- net: hns3: not reset vport who not alive when PF reset (bsc#1104353 bsc#1137201).\n- net: hns3: optimize the barrier using when cleaning TX BD (bsc#1104353 bsc#1134945).\n- net: hns3: prevent change MTU when resetting (bsc#1104353 bsc#1137201).\n- net: hns3: prevent double free in hns3_put_ring_config() (bsc#1104353 bsc#1134950).\n- net: hns3: reduce resources use in kdump kernel (bsc#1104353 bsc#1137201).\n- net: hns3: refactor BD filling for l2l3l4 info (bsc#1104353 bsc#1134947).\n- net: hns3: refine tx timeout count handle (bsc#1104353 bsc#1134990).\n- net: hns3: remove redundant assignment of l2_hdr to itself (bsc#1104353).\n- net: hns3: remove reset after command send failed (bsc#1104353 bsc#1134949).\n- net: hns3: remove resetting check in hclgevf_reset_task_schedule (bsc#1104353 bsc#1135056).\n- net: hns3: return 0 and print warning when hit duplicate MAC (bsc#1104353 bsc#1137201).\n- net: hns3: set dividual reset level for all RAS and MSI-X errors (bsc#1104353 bsc#1135046).\n- net: hns3: set up the vport alive state while reinitializing (bsc#1104353 bsc#1137201).\n- net: hns3: set vport alive state to default while resetting (bsc#1104353 bsc#1137201).\n- net: hns3: simplify hclgevf_cmd_csq_clean (bsc#1104353 ).\n- net: hns3: some cleanup for struct hns3_enet_ring (bsc#1104353 bsc#1134947).\n- net: hns3: split function hnae3_match_n_instantiate() (bsc#1104353).\n- net: hns3: stop mailbox handling when command queue need re-init (bsc#1104353 bsc#1135058).\n- net: hns3: stop sending keep alive msg when VF command queue needs reinit (bsc#1104353 bsc#1134972).\n- net: hns3: unify maybe_stop_tx for TSO and non-TSO case (bsc#1104353 bsc#1134947).\n- net: hns3: unify the page reusing for page size 4K and 64K (bsc#1104353 bsc#1134947).\n- net: hns3: use a reserved byte to identify need_resp flag (bsc#1104353).\n- net: hns3: use atomic_t replace u32 for arq\u0027s count (bsc#1104353 bsc#1134953).\n- net: hns3: use devm_kcalloc when allocating desc_cb (bsc#1104353 bsc#1134947).\n- net: hns3: use napi_schedule_irqoff in hard interrupts handlers (bsc#1104353 bsc#1134947).\n- net/ibmvnic: Remove tests of member address (bsc#1137739).\n- net/ipv4: defensive cipso option parsing (git-fixes).\n- net: make skb_partial_csum_set() more robust against overflows (git-fixes).\n- net/mlx5e: ethtool, Remove unsupported SFP EEPROM high pages query (networking-stable-19_04_30).\n- net/mlx5e: Fix trailing semicolon (bsc#1075020).\n- net/mlx5e: IPoIB, Reset QP after channels are closed (bsc#1075020).\n- net: phy: marvell: add new default led configure for m88e151x (bsc#1135018).\n- net: phy: marvell: change default m88e1510 LED configuration (bsc#1135018).\n- net: phy: marvell: Enable interrupt function on LED2 pin (bsc#1135018).\n- net: phy: marvell: Fix buffer overrun with stats counters (networking-stable-19_05_04).\n- net: rds: exchange of 8K and 1M pool (networking-stable-19_04_30).\n- net/rose: fix unbound loop in rose_loopback_timer() (networking-stable-19_04_30).\n- net/sched: do not dereference a-\u003egoto_chain to read the chain index (bsc#1064802 bsc#1066129).\n- net: stmmac: move stmmac_check_ether_addr() to driver probe (networking-stable-19_04_30).\n- net: thunderx: do not allow jumbo frames with XDP (networking-stable-19_04_19).\n- net: thunderx: raise XDP MTU to 1508 (networking-stable-19_04_19).\n- net/tls: free ctx in sock destruct (bsc#1136353 jsc#SLE-4688).\n- net: unbreak CONFIG_RETPOLINE=n builds (bsc#1124503).\n- net: use indirect call wrappers at GRO network layer (bsc#1124503).\n- net: use indirect call wrappers at GRO transport layer (bsc#1124503).\n- NFS add module option to limit NFSv4 minor version (jsc#PM-231).\n- nvme: Do not remove namespaces during reset (bsc#1131673).\n- nvme: flush scan_work when resetting controller (bsc#1131673).\n- nvmem: allow to select i.MX nvmem driver for i.MX 7D (bsc#1051510).\n- nvmem: core: fix read buffer in place (bsc#1051510).\n- nvmem: correct Broadcom OTP controller driver writes (bsc#1051510).\n- nvmem: Do not let a NULL cell_id for nvmem_cell_get() crash us (bsc#1051510).\n- nvmem: imx-ocotp: Add i.MX7D timing write clock setup support (bsc#1051510).\n- nvmem: imx-ocotp: Add support for banked OTP addressing (bsc#1051510).\n- nvmem: imx-ocotp: Enable i.MX7D OTP write support (bsc#1051510).\n- nvmem: imx-ocotp: Move i.MX6 write clock setup to dedicated function (bsc#1051510).\n- nvmem: imx-ocotp: Pass parameters via a struct (bsc#1051510).\n- nvmem: imx-ocotp: Restrict OTP write to IMX6 processors (bsc#1051510).\n- nvmem: imx-ocotp: Update module description (bsc#1051510).\n- nvmem: properly handle returned value nvmem_reg_read (bsc#1051510).\n- nvme-rdma: fix possible free of a non-allocated async event buffer (bsc#1120423).\n- nvme: skip nvme_update_disk_info() if the controller is not live (bsc#1128432).\n- objtool: Fix function fallthrough detection (bsc#1058115).\n- ocfs2: fix ocfs2 read inode data panic in ocfs2_iget (bsc#1136434).\n- of: fix clang -Wunsequenced for be32_to_cpu() (bsc#1135642).\n- p54: drop device reference count if fails to enable device (bsc#1135642).\n- parport: Fix mem leak in parport_register_dev_model (bsc#1051510).\n- PCI: endpoint: Use EPC\u0027s device in dma_alloc_coherent()/dma_free_coherent() (git-fixes).\n- PCI: Factor out pcie_retrain_link() function (git-fixes).\n- PCI: PM: Avoid possible suspend-to-idle issue (bsc#1051510).\n- PCI: Work around Pericom PCIe-to-PCI bridge Retrain Link erratum (git-fixes).\n- perf tools: Add Hygon Dhyana support ().\n- platform/chrome: cros_ec_proto: check for NULL transfer function (bsc#1051510).\n- platform/mellanox: mlxreg-hotplug: Add devm_free_irq call to remove flow (bsc#1111666).\n- platform/x86: intel_pmc_core: Add ICL platform support (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Add Package cstates residency info (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Avoid a u32 overflow (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Include Reserved IP for LTR (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Mark local function static (jsc#SLE-5226).\n- platform/x86: intel_pmc_core: Quirk to ignore XTAL shutdown (jsc#SLE-5226).\n- platform/x86: mlx-platform: Fix parent device in i2c-mux-reg device registration (bsc#1051510).\n- platform/x86: pmc_atom: Add Lex 3I380D industrial PC to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add several Beckhoff Automation boards to critclk_systems DMI table (bsc#1051510).\n- PM / core: Propagate dev-\u003epower.wakeup_path when no callbacks (bsc#1051510).\n- powerpc: Always initialize input array when calling epapr_hypercall() (bsc#1065729).\n- powerpc/cacheinfo: add cacheinfo_teardown, cacheinfo_rebuild (bsc#1138374, LTC#178199).\n- powerpc/eeh: Fix race with driver un/bind (bsc#1065729).\n- powerpc: Fix HMIs on big-endian with CONFIG_RELOCATABLE=y (bsc#1065729).\n- powerpc/msi: Fix NULL pointer access in teardown code (bsc#1065729).\n- powerpc/perf: Fix MMCRA corruption by bhrb_filter (bsc#1053043).\n- powerpc/powernv/idle: Restore IAMR after idle (bsc#1065729).\n- powerpc/process: Fix sparse address space warnings (bsc#1065729).\n- powerpc/pseries: Fix oops in hotplug memory notifier (bsc#1138375, LTC#178204).\n- powerpc/pseries/mobility: prevent cpu hotplug during DT update (bsc#1138374, LTC#178199).\n- powerpc/pseries/mobility: rebuild cacheinfo hierarchy post-migration (bsc#1138374, LTC#178199).\n- power: supply: max14656: fix potential use-before-alloc (bsc#1051510).\n- power: supply: sysfs: prevent endless uevent loop with CONFIG_POWER_SUPPLY_DEBUG (bsc#1051510).\n- ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK (git-fixes).\n- qed: Add API for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add infrastructure for error detection and recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Add iWARP 100g support (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add llh ppfid interface and 100g support for offload protocols (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Add qed devlink parameters table (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed*: Change hwfn used for sb initialization (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Define new MF bit for no_vlan config (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Delete redundant doorbell recovery types (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Add ethtool interface for SmartAN query (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Error recovery process (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Fix internal loopback failure with jumbo mtu configuration (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: fix write to free\u0027d pointer error and double free of ptp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Handle infinite driver spinning for Tx timestamp (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: place ethtool_rx_flow_spec after code after TC flower codebase (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qede: Populate mbi version in ethtool driver query data (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix indentation issue with statements in an if-block (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP buffer size provided for syn packet processing (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix iWARP syn packet mac address validation (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix missing DORQ attentions (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027faspath\u0027 -\u003e \u0027fastpath\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: fix spelling mistake \u0027inculde\u0027 -\u003e \u0027include\u0027 (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix static checker warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the doorbell address sanity check (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Fix the DORQ\u0027s attentions handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Mark expected switch fall-through (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify api for performing a dmae to another PF (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Modify offload protocols to use the affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qedr: Change the MSI-X vectors selection to be based on affined engine (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Read device port count from the shmem (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Reduce the severity of ptp debug message (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove duplicated include from qed_if.h (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: remove redundant assignment to rc (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Revise load sequence to avoid PCI errors (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qed: Set the doorbell address correctly (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- qla2xxx: kABI fixes for v10.00.00.14-k (bsc#1136215).\n- qla2xxx: kABI fixes for v10.01.00.15-k (bsc#1136215).\n- qlcnic: Avoid potential NULL pointer dereference (bsc#1051510).\n- qlcnic: remove assumption that vlan_tci != 0 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027cur_rings, max_hw_rings, tx_desc_info\u0027 (bsc#1136469 jsc#SLE-4695).\n- qlcnic: remove set but not used variables \u0027op, cmd_op\u0027 (bsc#1136469 jsc#SLE-4695).\n- qmi_wwan: Add quirk for Quectel dynamic config (bsc#1051510).\n- RDMA/cxbg: Use correct sizing on buffers holding page DMA addresses (bsc#1136348 jsc#SLE-4684).\n- RDMA/cxgb4: Do not expose DMA addresses (bsc#1136348 jsc#SLE-4684).\n- RDMA/cxgb4: Fix null pointer dereference on alloc_skb failure (bsc#1136348 jsc#SLE-4684).\n- RDMA/cxgb4: Fix spelling mistake \u0027immedate\u0027 -\u003e \u0027immediate\u0027 (bsc#1136348 jsc#SLE-4684).\n- RDMA/cxgb4: Remove kref accounting for sync operation (bsc#1136348 jsc#SLE-4684).\n- RDMA/cxgb4: Use sizeof() notation (bsc#1136348 jsc#SLE-4684).\n- RDMA/hns: Add constraint on the setting of local ACK timeout (bsc#1104427 bsc#1137233).\n- RDMA/hns: Add SCC context allocation support for hip08 (bsc#1104427 bsc#1126206).\n- RDMA/hns: Add SCC context clr support for hip08 (bsc#1104427 bsc#1126206).\n- RDMA/hns: Add the process of AEQ overflow for hip08 (bsc#1104427 bsc#1126206).\n- RDMA/hns: Add timer allocation support for hip08 (bsc#1104427 bsc#1126206).\n- RDMA/hns: Bugfix for mapping user db (bsc#1104427 bsc#1137236).\n- RDMA/hns: Bugfix for posting multiple srq work request (bsc#1104427 bsc#1137236).\n- RDMA/hns: Bugfix for SCC hem free (bsc#1104427 bsc#1137236).\n- RDMA/hns: Bugfix for sending with invalidate (bsc#1104427 bsc#1137236).\n- RDMA/hns: Bugfix for set hem of SCC (bsc#1104427 bsc#1137236).\n- RDMA/hns: Bugfix for the scene without receiver queue (bsc#1104427 bsc#1137233).\n- RDMA/hns: Configure capacity of hns device (bsc#1104427 bsc#1137236).\n- RDMA/hns: Delete unused variable in hns_roce_v2_modify_qp function (bsc#1104427).\n- RDMA/hns: Delete useful prints for aeq subtype event (bsc#1104427 bsc#1126206).\n- RDMA/hns: Fix bad endianess of port_pd variable (bsc#1104427 ).\n- RDMA/hns: Fix bug that caused srq creation to fail (bsc#1104427 ).\n- RDMA/hns: Fix the bug with updating rq head pointer when flush cqe (bsc#1104427 bsc#1137233).\n- RDMA/hns: Fix the chip hanging caused by sending doorbell during reset (bsc#1104427 bsc#1137232).\n- RDMA/hns: Fix the chip hanging caused by sending mailbox\u0026CMQ during reset (bsc#1104427 bsc#1137232).\n- RDMA/hns: Fix the Oops during rmmod or insmod ko when reset occurs (bsc#1104427 bsc#1137232).\n- RDMA/hns: Fix the state of rereg mr (bsc#1104427 bsc#1137236).\n- RDMA/hns: Hide error print information with roce vf device (bsc#1104427 bsc#1137236).\n- RDMA/hns: Limit minimum ROCE CQ depth to 64 (bsc#1104427 bsc#1137236).\n- RDMA/hns: Limit scope of hns_roce_cmq_send() (bsc#1104427 ).\n- RDMA/hns: Make some function static (bsc#1104427 bsc#1126206).\n- RDMA/hns: Modify qp\u0026cq\u0026pd specification according to UM (bsc#1104427 bsc#1137233).\n- RDMA/hns: Modify the pbl ba page size for hip08 (bsc#1104427 bsc#1137233).\n- RDMA/hns: Move spin_lock_irqsave to the correct place (bsc#1104427 bsc#1137236).\n- RDMA/hns: Only assgin some fields if the relatived attr_mask is set (bsc#1104427).\n- RDMA/hns: Only assign the fields of the rq psn if IB_QP_RQ_PSN is set (bsc#1104427).\n- RDMA/hns: Only assign the relatived fields of psn if IB_QP_SQ_PSN is set (bsc#1104427).\n- RDMA/hns: RDMA/hns: Assign rq head pointer when enable rq record db (bsc#1104427 bsc#1137236).\n- RDMA/hns: Remove jiffies operation in disable interrupt context (bsc#1104427 bsc#1137236).\n- RDMA/hns: Remove set but not used variable \u0027rst\u0027 (bsc#1104427 bsc#1126206).\n- RDMA/hns: Set allocated memory to zero for wrid (bsc#1104427 bsc#1137236).\n- RDMA/hns: Support to create 1M srq queue (bsc#1104427 ).\n- RDMA/hns: Update CQE specifications (bsc#1104427 bsc#1137236).\n- RDMA/hns: Update the range of raq_psn field of qp context (bsc#1104427).\n- RDMA/i40iw: Handle workqueue allocation failure (jsc#SLE-4793).\n- RDMA/iwcm: add tos_set bool to iw_cm struct (bsc#1136348 jsc#SLE-4684).\n- RDMA/iw_cxgb4: Always disconnect when QP is transitioning to TERMINATE state (bsc#1136348 jsc#SLE-4684).\n- RDMA/qedr: Fix incorrect device rate (bsc#1136188).\n- RDMA/qedr: Fix out of bounds index check in query pkey (bsc#1136456 jsc#SLE-4689).\n- RDMA/rdmavt: Use correct sizing on buffers holding page DMA addresses (jsc#SLE-4925).\n- RDMA/rxe: Consider skb reserve space based on netdev of GID (bsc#1082387, bsc#1103992).\n- Revert \u0027ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops\u0027 (bsc#1051510).\n- Revert \u0027HID: wacom: generic: Send BTN_TOOL_PEN in prox once the pen enters range\u0027 (bsc#1051510).\n- rtc: 88pm860x: prevent use-after-free on device remove (bsc#1051510).\n- rtc: da9063: set uie_unsupported when relevant (bsc#1051510).\n- rtc: do not reference bogus function pointer in kdoc (bsc#1051510).\n- rtc: sh: Fix invalid alarm warning for non-enabled alarm (bsc#1051510).\n- rtlwifi: fix a potential NULL pointer dereference (bsc#1051510).\n- rtlwifi: fix potential NULL pointer dereference (bsc#1111666).\n- s390/airq: provide cacheline aligned ivs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/airq: recognize directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390: enable processes for mio instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/ism: move oddities of device IO to wrapper function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to disable usage of MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: add parameter to force floating irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: clarify interrupt vector usage (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: fix assignment of bus resources (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: fix struct definition for set PCI function (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: gather statistics for floating vs directed irqs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: mark command line parser data __initdata (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move everything irq related to pci_irq.c (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: move io address mapping code to pci_insn.c (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: provide support for CPU directed interrupts (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: provide support for MIO instructions (jsc#SLE-5802 bsc#1134738 LTC#173387).\n- s390/pci: remove stale rc (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/pci: remove unused define (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/protvirt: add memory sharing for diag 308 set/store (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/protvirt: block kernel command line alteration (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- s390/sclp: detect DIRQ facility (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390: show statistics for MSI IRQs (jsc#SLE-5789 bsc#1134730 LTC#173388).\n- s390/uv: introduce guest side ultravisor code (jsc#SLE-5759 bsc#1135153 LTC#173151).\n- scsi: hisi: KABI ignore new symbols (bsc#1135038).\n- scsi: hisi_sas: add host reset interface for test (bsc#1135041).\n- scsi: hisi_sas: Add softreset in hisi_sas_I_T_nexus_reset() (bsc#1135033).\n- scsi: hisi_sas: Adjust the printk format of functions hisi_sas_init_device() (bsc#1135037).\n- scsi: hisi_sas: allocate different SAS address for directly attached situation (bsc#1135036).\n- scsi: hisi_sas: Do not fail IT nexus reset for Open Reject timeout (bsc#1135033).\n- scsi: hisi_sas: Do not hard reset disk during controller reset (bsc#1135034).\n- scsi: hisi_sas: Fix for setting the PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Remedy inconsistent PHY down state in software (bsc#1135039).\n- scsi: hisi_sas: remove the check of sas_dev status in hisi_sas_I_T_nexus_reset() (bsc#1135037).\n- scsi: hisi_sas: Send HARD RESET to clear the previous affiliation of STP target port (bsc#1135037).\n- scsi: hisi_sas: Set PHY linkrate when disconnected (bsc#1135038).\n- scsi: hisi_sas: Some misc tidy-up (bsc#1135031).\n- scsi: hisi_sas: Support all RAS events with MSI interrupts (bsc#1135035).\n- scsi: libsas: Do discovery on empty PHY to update PHY info (bsc#1135024).\n- scsi: libsas: Improve vague log in SAS rediscovery (bsc#1135027).\n- scsi: libsas: Inject revalidate event for root port event (bsc#1135026).\n- scsi: libsas: Print expander PHY indexes in decimal (bsc#1135021).\n- scsi: libsas: Stop hardcoding SAS address length (bsc#1135029).\n- scsi: libsas: Support SATA PHY connection rate unmatch fixing during discovery (bsc#1135028).\n- scsi: libsas: Try to retain programmed min linkrate for SATA min pathway unmatch fixing (bsc#1135028).\n- scsi: qedf: fixup bit operations (bsc#1135542).\n- scsi: qedf: fixup locking in qedf_restart_rport() (bsc#1135542).\n- scsi: qedf: missing kref_put in qedf_xmit() (bsc#1135542).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1136215).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1136215).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1136215).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1136215).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1136215).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1136215).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1136215).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1136215).\n- scsi: qla2xxx: avoid printf format warning (bsc#1136215).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1136215).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1136215).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1136215).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1136215).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1136215).\n- scsi: qla2xxx: Declare local functions \u0027static\u0027 (bsc#1137444).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1136215).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1136215).\n- scsi: qla2xxx: fix error message on \u0026lt;qla2400 (bsc#1118139).\n- scsi: qla2xxx: Fix function argument descriptions (bsc#1118139).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1136215).\n- scsi: qla2xxx: Fix memory corruption during hba reset test (bsc#1118139).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1136215).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1136215).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1136215).\n- scsi: qla2xxx: fix spelling mistake: \u0027existant\u0027 -\u003e \u0027existent\u0027 (bsc#1118139).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1136215).\n- scsi: qla2xxx: fully convert to the generic DMA API (bsc#1137444).\n- scsi: qla2xxx: fx00 copypaste typo (bsc#1118139).\n- scsi: qla2xxx: Improve several kernel-doc headers (bsc#1137444).\n- scsi: qla2xxx: Introduce a switch/case statement in qlt_xmit_tm_rsp() (bsc#1137444).\n- scsi: qla2xxx: Make qla2x00_sysfs_write_nvram() easier to analyze (bsc#1137444).\n- scsi: qla2xxx: Make sure that qlafx00_ioctl_iosb_entry() initializes \u0027res\u0027 (bsc#1137444).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1136215).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1136215).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1136215).\n- scsi: qla2xxx: NULL check before some freeing functions is not needed (bsc#1137444).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1136215).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1136215).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1137444).\n- scsi: qla2xxx: Remove FW default template (bsc#1136215).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1136215).\n- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq (bsc#1118139).\n- scsi: qla2xxx: Remove two arguments from qlafx00_error_entry() (bsc#1137444).\n- scsi: qla2xxx: Remove unused symbols (bsc#1118139).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1136215).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1136215).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1136215).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1136215).\n- scsi: qla2xxx: Split the __qla2x00_abort_all_cmds() function (bsc#1137444).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1136215).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1136215).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1136215).\n- scsi: qla2xxx: use lower_32_bits and upper_32_bits instead of reinventing them (bsc#1137444).\n- scsi: qla2xxx: Use %p for printing pointers (bsc#1118139).\n- scsi: zfcp: make DIX experimental, disabled, and independent of DIF (jsc#SLE-6772).\n- sctp: avoid running the sctp state machine recursively (networking-stable-19_05_04).\n- serial: sh-sci: disable DMA for uart_console (bsc#1051510).\n- signal: Always notice exiting tasks (git-fixes).\n- signal: Better detection of synchronous signals (git-fixes).\n- signal: Restore the stop PTRACE_EVENT_EXIT (git-fixes).\n- spi: bitbang: Fix NULL pointer dereference in spi_unregister_master (bsc#1051510).\n- spi: Fix zero length xfer bug (bsc#1051510).\n- spi-nor: intel-spi: Add support for Intel Comet Lake SPI serial flash (jsc#SLE-5358).\n- spi: pxa2xx: Add support for Intel Comet Lake (jsc#SLE-5331).\n- spi: pxa2xx: fix SCR (divisor) calculation (bsc#1051510).\n- spi: spi-fsl-spi: call spi_finalize_current_message() at the end (bsc#1051510).\n- spi : spi-topcliff-pch: Fix to handle empty DMA buffers (bsc#1051510).\n- spi: tegra114: reset controller on probe (bsc#1051510).\n- Staging: vc04_services: Fix a couple error codes (bsc#1051510).\n- staging: vc04_services: prevent integer overflow in create_pagelist() (bsc#1051510).\n- staging: wlan-ng: fix adapter initialization failure (bsc#1051510).\n- stmmac: pci: Adjust IOT2000 matching (networking-stable-19_04_30).\n- supported.conf: Add cls_bpf, sch_ingress to kernel-default-base (bsc#1134743).\n- switchtec: Fix unintended mask of MRPC event (git-fixes).\n- tcp: add tcp_min_snd_mss sysctl (bsc#1137586).\n- tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() (bsc#1137586).\n- tcp: limit payload size of sacked skbs (bsc#1137586).\n- tcp: tcp_fragment() should apply sane memory limits (bsc#1137586).\n- tcp: tcp_grow_window() needs to respect tcp_space() (networking-stable-19_04_19).\n- team: fix possible recursive locking when add slaves (networking-stable-19_04_30).\n- test_firmware: Use correct snprintf() limit (bsc#1135642).\n- thunderbolt: Fix to check for kmemdup failure (bsc#1051510).\n- tipc: fix hanging clients using poll with EPOLLOUT flag (git-fixes).\n- tipc: missing entries in name table of publications (networking-stable-19_04_19).\n- tools/cpupower: Add Hygon Dhyana support ().\n- tracing: Fix partial reading of trace event\u0027s id file (bsc#1136573).\n- treewide: Use DEVICE_ATTR_WO (bsc#1137739).\n- tty: ipwireless: fix missing checks for ioremap (bsc#1051510).\n- tty: serial: msm_serial: Fix XON/XOFF (bsc#1051510).\n- tty/vt: fix write/write race in ioctl(KDSKBSENT) handler (bsc#1051510).\n- udp: use indirect call wrappers for GRO socket lookup (bsc#1124503).\n- Update config files for NFSv4.2\n- Update cx2072x patches to follow the upstream development (bsc#1068546)\n- USB: Add LPM quirk for Surface Dock GigE adapter (bsc#1051510).\n- usb: core: Add PM runtime calls to usb_hcd_platform_shutdown (bsc#1051510).\n- USB: core: Do not unbind interfaces following device reset failure (bsc#1051510).\n- usb: dwc2: Fix DMA cache alignment issues (bsc#1051510).\n- USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor (bsc#1051510).\n- usbip: usbip_host: fix BUG: sleeping function called from invalid context (bsc#1051510).\n- usbip: usbip_host: fix stub_dev lock context imbalance regression (bsc#1051510).\n- usbnet: fix kernel crash after disconnect (bsc#1051510).\n- USB: rio500: fix memory leak in close after disconnect (bsc#1051510).\n- USB: rio500: refuse more than one device at a time (bsc#1051510).\n- USB: sisusbvga: fix oops in error path of sisusb_probe (bsc#1051510).\n- userfaultfd: use RCU to free the task struct when fork fails (git-fixes).\n- vhost: reject zero size iova range (networking-stable-19_04_19).\n- video: hgafb: fix potential NULL pointer dereference (bsc#1051510).\n- video: imsttfb: fix potential NULL pointer dereferences (bsc#1051510).\n- virtio_console: initialize vtermno value for ports (bsc#1051510).\n- vxlan: trivial indenting fix (bsc#1051510).\n- vxlan: use __be32 type for the param vni in __vxlan_fdb_delete (bsc#1051510).\n- w1: fix the resume command API (bsc#1051510).\n- watchdog: imx2_wdt: Fix set_timeout for big timeout values (bsc#1051510).\n- wil6210: fix return code of wmi_mgmt_tx and wmi_mgmt_tx_ext (bsc#1111666).\n- x86_64: Add gap to int3 to allow for call emulation (bsc#1099658).\n- x86_64: Allow breakpoints to emulate call instructions (bsc#1099658).\n- x86/alternative: Init ideal_nops for Hygon Dhyana ().\n- x86/amd_nb: Check vendor in AMD-only functions ().\n- x86/apic: Add Hygon Dhyana support ().\n- x86/bugs: Add Hygon Dhyana to the respective mitigation machinery ().\n- x86/CPU: Add Icelake model number (jsc#SLE-5226).\n- x86/cpu: Create Hygon Dhyana architecture support file ().\n- x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana ().\n- x86/CPU/hygon: Fix phys_proc_id calculation logic for multi-die processors ().\n- x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number ().\n- x86/events: Add Hygon Dhyana support to PMU infrastructure ().\n- x86/kvm: Add Hygon Dhyana support to KVM ().\n- x86/mce: Add Hygon Dhyana support to the MCA infrastructure ().\n- x86/mce: Do not disable MCA banks when offlining a CPU on AMD ().\n- x86/pci, x86/amd_nb: Add Hygon Dhyana support to PCI and northbridge ().\n- x86/smpboot: Do not use BSP INIT delay and MWAIT to idle on Dhyana ().\n- x86/umip: Make the UMIP activated message generic (bsc#1138336).\n- x86/umip: Print UMIP line only once (bsc#1138336).\n- x86/xen: Add Hygon Dhyana support to Xen ().\n- xenbus: drop useless LIST_HEAD in xenbus_write_watch() and xenbus_file_write() (bsc#1065600).\n- xen/pciback: Do not disable PCI_COMMAND on PCI device reset (bsc#1065600).\n- xfs: do not clear imap_valid for a non-uptodate buffers (bsc#1138018).\n- xfs: do not look at buffer heads in xfs_add_to_ioend (bsc#1138013).\n- xfs: do not set the page uptodate in xfs_writepage_map (bsc#1138003).\n- xfs: do not use XFS_BMAPI_ENTRIRE in xfs_get_blocks (bsc#1137999).\n- xfs: do not use XFS_BMAPI_IGSTATE in xfs_map_blocks (bsc#1138005).\n- xfs: eof trim writeback mapping as soon as it is cached (bsc#1138019).\n- xfs: fix s_maxbytes overflow problems (bsc#1137996).\n- xfs: make xfs_writepage_map extent map centric (bsc#1138009).\n- xfs: minor cleanup for xfs_get_blocks (bsc#1138000).\n- xfs: move all writeback buffer_head manipulation into xfs_map_at_offset (bsc#1138014).\n- xfs: refactor the tail of xfs_writepage_map (bsc#1138016).\n- xfs: remove the imap_valid flag (bsc#1138012).\n- xfs: remove unused parameter from xfs_writepage_map (bsc#1137995).\n- xfs: remove XFS_IO_INVALID (bsc#1138017).\n- xfs: remove xfs_map_cow (bsc#1138007).\n- xfs: remove xfs_reflink_find_cow_mapping (bsc#1138010).\n- xfs: remove xfs_reflink_trim_irec_to_next_cow (bsc#1138006).\n- xfs: remove xfs_start_page_writeback (bsc#1138015).\n- xfs: rename the offset variable in xfs_writepage_map (bsc#1138008).\n- xfs: serialize unaligned dio writes against all other dio writes (bsc#1134936).\n- xfs: simplify xfs_map_blocks by using xfs_iext_lookup_extent directly (bsc#1138011).\n- xfs: skip CoW writes past EOF when writeback races with truncate (bsc#1137998).\n- xfs: xfs_reflink_convert_cow() memory allocation deadlock (bsc#1138002).\n- xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic() (bsc#1051510).\n- xhci: update bounce buffer with correct sg num (bsc#1051510).\n- xhci: Use %zu for printing size_t type (bsc#1051510).\n- xsk: export xdp_get_umem_from_qid (jsc#SLE-4797).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1571",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1571-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1571-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1571-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1053043",
"url": "https://bugzilla.suse.com/1053043"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068546",
"url": "https://bugzilla.suse.com/1068546"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1075020",
"url": "https://bugzilla.suse.com/1075020"
},
{
"category": "self",
"summary": "SUSE Bug 1082387",
"url": "https://bugzilla.suse.com/1082387"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1085535",
"url": "https://bugzilla.suse.com/1085535"
},
{
"category": "self",
"summary": "SUSE Bug 1093389",
"url": "https://bugzilla.suse.com/1093389"
},
{
"category": "self",
"summary": "SUSE Bug 1099658",
"url": "https://bugzilla.suse.com/1099658"
},
{
"category": "self",
"summary": "SUSE Bug 1103992",
"url": "https://bugzilla.suse.com/1103992"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1111696",
"url": "https://bugzilla.suse.com/1111696"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1115688",
"url": "https://bugzilla.suse.com/1115688"
},
{
"category": "self",
"summary": "SUSE Bug 1117114",
"url": "https://bugzilla.suse.com/1117114"
},
{
"category": "self",
"summary": "SUSE Bug 1117158",
"url": "https://bugzilla.suse.com/1117158"
},
{
"category": "self",
"summary": "SUSE Bug 1117561",
"url": "https://bugzilla.suse.com/1117561"
},
{
"category": "self",
"summary": "SUSE Bug 1118139",
"url": "https://bugzilla.suse.com/1118139"
},
{
"category": "self",
"summary": "SUSE Bug 1120091",
"url": "https://bugzilla.suse.com/1120091"
},
{
"category": "self",
"summary": "SUSE Bug 1120423",
"url": "https://bugzilla.suse.com/1120423"
},
{
"category": "self",
"summary": "SUSE Bug 1120566",
"url": "https://bugzilla.suse.com/1120566"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1124503",
"url": "https://bugzilla.suse.com/1124503"
},
{
"category": "self",
"summary": "SUSE Bug 1126206",
"url": "https://bugzilla.suse.com/1126206"
},
{
"category": "self",
"summary": "SUSE Bug 1126356",
"url": "https://bugzilla.suse.com/1126356"
},
{
"category": "self",
"summary": "SUSE Bug 1127616",
"url": "https://bugzilla.suse.com/1127616"
},
{
"category": "self",
"summary": "SUSE Bug 1128432",
"url": "https://bugzilla.suse.com/1128432"
},
{
"category": "self",
"summary": "SUSE Bug 1130699",
"url": "https://bugzilla.suse.com/1130699"
},
{
"category": "self",
"summary": "SUSE Bug 1131673",
"url": "https://bugzilla.suse.com/1131673"
},
{
"category": "self",
"summary": "SUSE Bug 1133190",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "self",
"summary": "SUSE Bug 1133612",
"url": "https://bugzilla.suse.com/1133612"
},
{
"category": "self",
"summary": "SUSE Bug 1133616",
"url": "https://bugzilla.suse.com/1133616"
},
{
"category": "self",
"summary": "SUSE Bug 1134090",
"url": "https://bugzilla.suse.com/1134090"
},
{
"category": "self",
"summary": "SUSE Bug 1134671",
"url": "https://bugzilla.suse.com/1134671"
},
{
"category": "self",
"summary": "SUSE Bug 1134730",
"url": "https://bugzilla.suse.com/1134730"
},
{
"category": "self",
"summary": "SUSE Bug 1134738",
"url": "https://bugzilla.suse.com/1134738"
},
{
"category": "self",
"summary": "SUSE Bug 1134743",
"url": "https://bugzilla.suse.com/1134743"
},
{
"category": "self",
"summary": "SUSE Bug 1134806",
"url": "https://bugzilla.suse.com/1134806"
},
{
"category": "self",
"summary": "SUSE Bug 1134936",
"url": "https://bugzilla.suse.com/1134936"
},
{
"category": "self",
"summary": "SUSE Bug 1134945",
"url": "https://bugzilla.suse.com/1134945"
},
{
"category": "self",
"summary": "SUSE Bug 1134946",
"url": "https://bugzilla.suse.com/1134946"
},
{
"category": "self",
"summary": "SUSE Bug 1134947",
"url": "https://bugzilla.suse.com/1134947"
},
{
"category": "self",
"summary": "SUSE Bug 1134948",
"url": "https://bugzilla.suse.com/1134948"
},
{
"category": "self",
"summary": "SUSE Bug 1134949",
"url": "https://bugzilla.suse.com/1134949"
},
{
"category": "self",
"summary": "SUSE Bug 1134950",
"url": "https://bugzilla.suse.com/1134950"
},
{
"category": "self",
"summary": "SUSE Bug 1134951",
"url": "https://bugzilla.suse.com/1134951"
},
{
"category": "self",
"summary": "SUSE Bug 1134952",
"url": "https://bugzilla.suse.com/1134952"
},
{
"category": "self",
"summary": "SUSE Bug 1134953",
"url": "https://bugzilla.suse.com/1134953"
},
{
"category": "self",
"summary": "SUSE Bug 1134972",
"url": "https://bugzilla.suse.com/1134972"
},
{
"category": "self",
"summary": "SUSE Bug 1134974",
"url": "https://bugzilla.suse.com/1134974"
},
{
"category": "self",
"summary": "SUSE Bug 1134975",
"url": "https://bugzilla.suse.com/1134975"
},
{
"category": "self",
"summary": "SUSE Bug 1134980",
"url": "https://bugzilla.suse.com/1134980"
},
{
"category": "self",
"summary": "SUSE Bug 1134981",
"url": "https://bugzilla.suse.com/1134981"
},
{
"category": "self",
"summary": "SUSE Bug 1134983",
"url": "https://bugzilla.suse.com/1134983"
},
{
"category": "self",
"summary": "SUSE Bug 1134987",
"url": "https://bugzilla.suse.com/1134987"
},
{
"category": "self",
"summary": "SUSE Bug 1134989",
"url": "https://bugzilla.suse.com/1134989"
},
{
"category": "self",
"summary": "SUSE Bug 1134990",
"url": "https://bugzilla.suse.com/1134990"
},
{
"category": "self",
"summary": "SUSE Bug 1134994",
"url": "https://bugzilla.suse.com/1134994"
},
{
"category": "self",
"summary": "SUSE Bug 1134995",
"url": "https://bugzilla.suse.com/1134995"
},
{
"category": "self",
"summary": "SUSE Bug 1134998",
"url": "https://bugzilla.suse.com/1134998"
},
{
"category": "self",
"summary": "SUSE Bug 1134999",
"url": "https://bugzilla.suse.com/1134999"
},
{
"category": "self",
"summary": "SUSE Bug 1135018",
"url": "https://bugzilla.suse.com/1135018"
},
{
"category": "self",
"summary": "SUSE Bug 1135021",
"url": "https://bugzilla.suse.com/1135021"
},
{
"category": "self",
"summary": "SUSE Bug 1135024",
"url": "https://bugzilla.suse.com/1135024"
},
{
"category": "self",
"summary": "SUSE Bug 1135026",
"url": "https://bugzilla.suse.com/1135026"
},
{
"category": "self",
"summary": "SUSE Bug 1135027",
"url": "https://bugzilla.suse.com/1135027"
},
{
"category": "self",
"summary": "SUSE Bug 1135028",
"url": "https://bugzilla.suse.com/1135028"
},
{
"category": "self",
"summary": "SUSE Bug 1135029",
"url": "https://bugzilla.suse.com/1135029"
},
{
"category": "self",
"summary": "SUSE Bug 1135031",
"url": "https://bugzilla.suse.com/1135031"
},
{
"category": "self",
"summary": "SUSE Bug 1135033",
"url": "https://bugzilla.suse.com/1135033"
},
{
"category": "self",
"summary": "SUSE Bug 1135034",
"url": "https://bugzilla.suse.com/1135034"
},
{
"category": "self",
"summary": "SUSE Bug 1135035",
"url": "https://bugzilla.suse.com/1135035"
},
{
"category": "self",
"summary": "SUSE Bug 1135036",
"url": "https://bugzilla.suse.com/1135036"
},
{
"category": "self",
"summary": "SUSE Bug 1135037",
"url": "https://bugzilla.suse.com/1135037"
},
{
"category": "self",
"summary": "SUSE Bug 1135038",
"url": "https://bugzilla.suse.com/1135038"
},
{
"category": "self",
"summary": "SUSE Bug 1135039",
"url": "https://bugzilla.suse.com/1135039"
},
{
"category": "self",
"summary": "SUSE Bug 1135041",
"url": "https://bugzilla.suse.com/1135041"
},
{
"category": "self",
"summary": "SUSE Bug 1135042",
"url": "https://bugzilla.suse.com/1135042"
},
{
"category": "self",
"summary": "SUSE Bug 1135044",
"url": "https://bugzilla.suse.com/1135044"
},
{
"category": "self",
"summary": "SUSE Bug 1135045",
"url": "https://bugzilla.suse.com/1135045"
},
{
"category": "self",
"summary": "SUSE Bug 1135046",
"url": "https://bugzilla.suse.com/1135046"
},
{
"category": "self",
"summary": "SUSE Bug 1135047",
"url": "https://bugzilla.suse.com/1135047"
},
{
"category": "self",
"summary": "SUSE Bug 1135049",
"url": "https://bugzilla.suse.com/1135049"
},
{
"category": "self",
"summary": "SUSE Bug 1135051",
"url": "https://bugzilla.suse.com/1135051"
},
{
"category": "self",
"summary": "SUSE Bug 1135052",
"url": "https://bugzilla.suse.com/1135052"
},
{
"category": "self",
"summary": "SUSE Bug 1135053",
"url": "https://bugzilla.suse.com/1135053"
},
{
"category": "self",
"summary": "SUSE Bug 1135055",
"url": "https://bugzilla.suse.com/1135055"
},
{
"category": "self",
"summary": "SUSE Bug 1135056",
"url": "https://bugzilla.suse.com/1135056"
},
{
"category": "self",
"summary": "SUSE Bug 1135058",
"url": "https://bugzilla.suse.com/1135058"
},
{
"category": "self",
"summary": "SUSE Bug 1135153",
"url": "https://bugzilla.suse.com/1135153"
},
{
"category": "self",
"summary": "SUSE Bug 1135542",
"url": "https://bugzilla.suse.com/1135542"
},
{
"category": "self",
"summary": "SUSE Bug 1135556",
"url": "https://bugzilla.suse.com/1135556"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135661",
"url": "https://bugzilla.suse.com/1135661"
},
{
"category": "self",
"summary": "SUSE Bug 1136188",
"url": "https://bugzilla.suse.com/1136188"
},
{
"category": "self",
"summary": "SUSE Bug 1136206",
"url": "https://bugzilla.suse.com/1136206"
},
{
"category": "self",
"summary": "SUSE Bug 1136215",
"url": "https://bugzilla.suse.com/1136215"
},
{
"category": "self",
"summary": "SUSE Bug 1136345",
"url": "https://bugzilla.suse.com/1136345"
},
{
"category": "self",
"summary": "SUSE Bug 1136347",
"url": "https://bugzilla.suse.com/1136347"
},
{
"category": "self",
"summary": "SUSE Bug 1136348",
"url": "https://bugzilla.suse.com/1136348"
},
{
"category": "self",
"summary": "SUSE Bug 1136353",
"url": "https://bugzilla.suse.com/1136353"
},
{
"category": "self",
"summary": "SUSE Bug 1136424",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "self",
"summary": "SUSE Bug 1136428",
"url": "https://bugzilla.suse.com/1136428"
},
{
"category": "self",
"summary": "SUSE Bug 1136430",
"url": "https://bugzilla.suse.com/1136430"
},
{
"category": "self",
"summary": "SUSE Bug 1136432",
"url": "https://bugzilla.suse.com/1136432"
},
{
"category": "self",
"summary": "SUSE Bug 1136434",
"url": "https://bugzilla.suse.com/1136434"
},
{
"category": "self",
"summary": "SUSE Bug 1136435",
"url": "https://bugzilla.suse.com/1136435"
},
{
"category": "self",
"summary": "SUSE Bug 1136438",
"url": "https://bugzilla.suse.com/1136438"
},
{
"category": "self",
"summary": "SUSE Bug 1136439",
"url": "https://bugzilla.suse.com/1136439"
},
{
"category": "self",
"summary": "SUSE Bug 1136456",
"url": "https://bugzilla.suse.com/1136456"
},
{
"category": "self",
"summary": "SUSE Bug 1136460",
"url": "https://bugzilla.suse.com/1136460"
},
{
"category": "self",
"summary": "SUSE Bug 1136461",
"url": "https://bugzilla.suse.com/1136461"
},
{
"category": "self",
"summary": "SUSE Bug 1136469",
"url": "https://bugzilla.suse.com/1136469"
},
{
"category": "self",
"summary": "SUSE Bug 1136477",
"url": "https://bugzilla.suse.com/1136477"
},
{
"category": "self",
"summary": "SUSE Bug 1136478",
"url": "https://bugzilla.suse.com/1136478"
},
{
"category": "self",
"summary": "SUSE Bug 1136498",
"url": "https://bugzilla.suse.com/1136498"
},
{
"category": "self",
"summary": "SUSE Bug 1136573",
"url": "https://bugzilla.suse.com/1136573"
},
{
"category": "self",
"summary": "SUSE Bug 1136586",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "self",
"summary": "SUSE Bug 1136598",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "self",
"summary": "SUSE Bug 1136881",
"url": "https://bugzilla.suse.com/1136881"
},
{
"category": "self",
"summary": "SUSE Bug 1136922",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "self",
"summary": "SUSE Bug 1136935",
"url": "https://bugzilla.suse.com/1136935"
},
{
"category": "self",
"summary": "SUSE Bug 1136978",
"url": "https://bugzilla.suse.com/1136978"
},
{
"category": "self",
"summary": "SUSE Bug 1136990",
"url": "https://bugzilla.suse.com/1136990"
},
{
"category": "self",
"summary": "SUSE Bug 1137151",
"url": "https://bugzilla.suse.com/1137151"
},
{
"category": "self",
"summary": "SUSE Bug 1137152",
"url": "https://bugzilla.suse.com/1137152"
},
{
"category": "self",
"summary": "SUSE Bug 1137153",
"url": "https://bugzilla.suse.com/1137153"
},
{
"category": "self",
"summary": "SUSE Bug 1137162",
"url": "https://bugzilla.suse.com/1137162"
},
{
"category": "self",
"summary": "SUSE Bug 1137201",
"url": "https://bugzilla.suse.com/1137201"
},
{
"category": "self",
"summary": "SUSE Bug 1137224",
"url": "https://bugzilla.suse.com/1137224"
},
{
"category": "self",
"summary": "SUSE Bug 1137232",
"url": "https://bugzilla.suse.com/1137232"
},
{
"category": "self",
"summary": "SUSE Bug 1137233",
"url": "https://bugzilla.suse.com/1137233"
},
{
"category": "self",
"summary": "SUSE Bug 1137236",
"url": "https://bugzilla.suse.com/1137236"
},
{
"category": "self",
"summary": "SUSE Bug 1137372",
"url": "https://bugzilla.suse.com/1137372"
},
{
"category": "self",
"summary": "SUSE Bug 1137429",
"url": "https://bugzilla.suse.com/1137429"
},
{
"category": "self",
"summary": "SUSE Bug 1137444",
"url": "https://bugzilla.suse.com/1137444"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137739",
"url": "https://bugzilla.suse.com/1137739"
},
{
"category": "self",
"summary": "SUSE Bug 1137752",
"url": "https://bugzilla.suse.com/1137752"
},
{
"category": "self",
"summary": "SUSE Bug 1137995",
"url": "https://bugzilla.suse.com/1137995"
},
{
"category": "self",
"summary": "SUSE Bug 1137996",
"url": "https://bugzilla.suse.com/1137996"
},
{
"category": "self",
"summary": "SUSE Bug 1137998",
"url": "https://bugzilla.suse.com/1137998"
},
{
"category": "self",
"summary": "SUSE Bug 1137999",
"url": "https://bugzilla.suse.com/1137999"
},
{
"category": "self",
"summary": "SUSE Bug 1138000",
"url": "https://bugzilla.suse.com/1138000"
},
{
"category": "self",
"summary": "SUSE Bug 1138002",
"url": "https://bugzilla.suse.com/1138002"
},
{
"category": "self",
"summary": "SUSE Bug 1138003",
"url": "https://bugzilla.suse.com/1138003"
},
{
"category": "self",
"summary": "SUSE Bug 1138005",
"url": "https://bugzilla.suse.com/1138005"
},
{
"category": "self",
"summary": "SUSE Bug 1138006",
"url": "https://bugzilla.suse.com/1138006"
},
{
"category": "self",
"summary": "SUSE Bug 1138007",
"url": "https://bugzilla.suse.com/1138007"
},
{
"category": "self",
"summary": "SUSE Bug 1138008",
"url": "https://bugzilla.suse.com/1138008"
},
{
"category": "self",
"summary": "SUSE Bug 1138009",
"url": "https://bugzilla.suse.com/1138009"
},
{
"category": "self",
"summary": "SUSE Bug 1138010",
"url": "https://bugzilla.suse.com/1138010"
},
{
"category": "self",
"summary": "SUSE Bug 1138011",
"url": "https://bugzilla.suse.com/1138011"
},
{
"category": "self",
"summary": "SUSE Bug 1138012",
"url": "https://bugzilla.suse.com/1138012"
},
{
"category": "self",
"summary": "SUSE Bug 1138013",
"url": "https://bugzilla.suse.com/1138013"
},
{
"category": "self",
"summary": "SUSE Bug 1138014",
"url": "https://bugzilla.suse.com/1138014"
},
{
"category": "self",
"summary": "SUSE Bug 1138015",
"url": "https://bugzilla.suse.com/1138015"
},
{
"category": "self",
"summary": "SUSE Bug 1138016",
"url": "https://bugzilla.suse.com/1138016"
},
{
"category": "self",
"summary": "SUSE Bug 1138017",
"url": "https://bugzilla.suse.com/1138017"
},
{
"category": "self",
"summary": "SUSE Bug 1138018",
"url": "https://bugzilla.suse.com/1138018"
},
{
"category": "self",
"summary": "SUSE Bug 1138019",
"url": "https://bugzilla.suse.com/1138019"
},
{
"category": "self",
"summary": "SUSE Bug 1138291",
"url": "https://bugzilla.suse.com/1138291"
},
{
"category": "self",
"summary": "SUSE Bug 1138293",
"url": "https://bugzilla.suse.com/1138293"
},
{
"category": "self",
"summary": "SUSE Bug 1138336",
"url": "https://bugzilla.suse.com/1138336"
},
{
"category": "self",
"summary": "SUSE Bug 1138374",
"url": "https://bugzilla.suse.com/1138374"
},
{
"category": "self",
"summary": "SUSE Bug 1138375",
"url": "https://bugzilla.suse.com/1138375"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11478 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11479 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11487 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12380 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12382 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12818 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12819 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3846/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-06-18T11:29:22Z",
"generator": {
"date": "2019-06-18T11:29:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1571-1",
"initial_release_date": "2019-06-18T11:29:22Z",
"revision_history": [
{
"date": "2019-06-18T11:29:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-devel-4.12.14-lp151.28.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-docs-4.12.14-lp151.28.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp151.28.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-macros-4.12.14-lp151.28.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-source-4.12.14-lp151.28.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-default-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10124"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10124",
"url": "https://www.suse.com/security/cve/CVE-2019-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1130699 for CVE-2019-10124",
"url": "https://bugzilla.suse.com/1130699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-10124"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11478"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11478",
"url": "https://www.suse.com/security/cve/CVE-2019-11478"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11478",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11479"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11479",
"url": "https://www.suse.com/security/cve/CVE-2019-11479"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1143542 for CVE-2019-11479",
"url": "https://bugzilla.suse.com/1143542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-11479"
},
{
"cve": "CVE-2019-11487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11487"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.1-rc5 allows page-\u003e_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11487",
"url": "https://www.suse.com/security/cve/CVE-2019-11487"
},
{
"category": "external",
"summary": "SUSE Bug 1133190 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133190"
},
{
"category": "external",
"summary": "SUSE Bug 1133191 for CVE-2019-11487",
"url": "https://bugzilla.suse.com/1133191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11487"
},
{
"cve": "CVE-2019-12380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12380"
}
],
"notes": [
{
"category": "general",
"text": "**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because \"All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12380",
"url": "https://www.suse.com/security/cve/CVE-2019-12380"
},
{
"category": "external",
"summary": "SUSE Bug 1136598 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1136598"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12380",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-12380"
},
{
"cve": "CVE-2019-12382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12382"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12382",
"url": "https://www.suse.com/security/cve/CVE-2019-12382"
},
{
"category": "external",
"summary": "SUSE Bug 1136586 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1136586"
},
{
"category": "external",
"summary": "SUSE Bug 1155298 for CVE-2019-12382",
"url": "https://bugzilla.suse.com/1155298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-12382"
},
{
"cve": "CVE-2019-12456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12456"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a \"double fetch\" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12456",
"url": "https://www.suse.com/security/cve/CVE-2019-12456"
},
{
"category": "external",
"summary": "SUSE Bug 1136922 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136922"
},
{
"category": "external",
"summary": "SUSE Bug 1136993 for CVE-2019-12456",
"url": "https://bugzilla.suse.com/1136993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-12456"
},
{
"cve": "CVE-2019-12818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12818"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12818",
"url": "https://www.suse.com/security/cve/CVE-2019-12818"
},
{
"category": "external",
"summary": "SUSE Bug 1138293 for CVE-2019-12818",
"url": "https://bugzilla.suse.com/1138293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-12818"
},
{
"cve": "CVE-2019-12819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12819"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12819",
"url": "https://www.suse.com/security/cve/CVE-2019-12819"
},
{
"category": "external",
"summary": "SUSE Bug 1138291 for CVE-2019-12819",
"url": "https://bugzilla.suse.com/1138291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-12819"
},
{
"cve": "CVE-2019-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3846"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3846",
"url": "https://www.suse.com/security/cve/CVE-2019-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1136424 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136424"
},
{
"category": "external",
"summary": "SUSE Bug 1136446 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1136446"
},
{
"category": "external",
"summary": "SUSE Bug 1156330 for CVE-2019-3846",
"url": "https://bugzilla.suse.com/1156330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.7.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.7.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-06-18T11:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-3846"
}
]
}
wid-sec-w-2023-0507
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0507 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0507.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0507 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0507"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-462066 vom 2023-04-11",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 1164286 vom 2023-02-28",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023022829"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory",
"url": "https://security.archlinux.org/ASA-201906-12"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4684.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4685.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4686.html"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory",
"url": "https://usn.ubuntu.com/4017-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory",
"url": "https://usn.ubuntu.com/4017-2/"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4689.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-1481.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1.html"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-15 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-15"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-14 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-14"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-13 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-13"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1488 vom 2019-06-18",
"url": "http://linux.oracle.com/errata/ELSA-2019-1488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14089-1 vom 2019-06-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0026 vom 2019-06-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-June/000945.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1550-1 vom 2019-06-19",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:1481 vom 2019-06-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-1481-Important-CentOS-7-kernel-Security-Update-tp4645573.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:1488 vom 2019-06-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-1488-Important-CentOS-6-kernel-Security-Update-tp4645572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1588-1 vom 2019-06-21",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1581-1 vom 2019-06-21",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1668-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191668-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1674-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191674-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1671-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191671-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1692-1 vom 2019-06-25",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191692-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1594 vom 2019-06-25",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1602 vom 2019-06-26",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "external",
"summary": "BLUECOAT Security Advisory SA41 vom 2019-06-27",
"url": "http://www.arista.com/en/support/advisories-notices/security-advisories/8066-security-advisory-41"
},
{
"category": "external",
"summary": "VMware Security Advisory VMSA-2019-0010 vom 2019-07-02",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX256725 vom 2019-07-09",
"url": "https://support.citrix.com/article/CTX256725"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1699 vom 2019-07-08",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1855-1 vom 2019-07-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1851-1 vom 2019-07-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1870-1 vom 2019-07-17",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1888-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191888-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1889-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191889-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1882-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191882-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4484 vom 2019-07-21",
"url": "https://www.debian.org/security/2019/dsa-4484"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1935-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191935-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1948-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191948-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1924-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191924-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1873 vom 2019-07-30",
"url": "http://linux.oracle.com/errata/ELSA-2019-1873.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2069-1 vom 2019-08-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192069-1.html"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2020-303 vom 2020-02-07",
"url": "http://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2020/2020_303.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2029.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1959 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-1959.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2411 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-2411.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "Symantec Security Advisory SYMSA1492 vom 2019-09-06",
"url": "https://support.symantec.com/us/en/article.SYMSA1492.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX256918 vom 2019-09-12",
"url": "https://support.citrix.com/article/CTX256918"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2658-1 vom 2019-10-15",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2756-1 vom 2019-10-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192756-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2821-1 vom 2019-10-30",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1.html"
},
{
"category": "external",
"summary": "Pulse Secure Security Advisory SA44193 vom 2019-11-06",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193/?kA23Z000000L6LMSA0="
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2950-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html"
},
{
"category": "external",
"summary": "FortiGuard Labs PSIRT Advisory FG-IR-19-180 vom 2019-11-29",
"url": "https://fortiguard.com/psirt/FG-IR-19-180"
},
{
"category": "external",
"summary": "NIOS 8.3.7 Released 18 FEB 2020",
"url": "https://support.infoblox.com/app/answers/detail/a_id/11591"
},
{
"category": "external",
"summary": "Infoblox Advisory 0622 vom 2020-06-04",
"url": "https://support.infoblox.com/app/answers/detail/a_id/10622"
},
{
"category": "external",
"summary": "HPE Security Bulletin hpesbst04140en_us vom 2021-06-02",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04140en_us"
},
{
"category": "external",
"summary": "Aruba Product Security Advisory ARUBA-PSA-2020-010 vom 2020-09-16",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBNW04041 rev.1 vom 2020-09-23",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04041en_us"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11053 vom 2020-10-14",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11053"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2019-827 vom 2021-05-20",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-827"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11104 vom 2021-01-13",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11104\u0026cat=SIRT_1"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11205 vom 2021-07-14",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11205\u0026cat=SIRT_1"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04141en_us"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2023-04-10T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:45:38.641+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0507",
"initial_release_date": "2019-06-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: DLA-1823"
},
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "3",
"summary": "Korrektur Status"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Arch Linux, Oracle Linux, SUSE, ORACLE und CentOS aufgenommen"
},
{
"date": "2019-06-20T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-24T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-25T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-26T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von BLUECOAT aufgenommen"
},
{
"date": "2019-06-27T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2019-06-30T22:00:00.000+00:00",
"number": "11",
"summary": "Referenz(en) aufgenommen: USN-4041-1, USN-4041-2"
},
{
"date": "2019-07-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von VMware aufgenommen"
},
{
"date": "2019-07-08T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Citrix und Red Hat aufgenommen"
},
{
"date": "2019-07-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-17T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-18T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-21T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2019-07-23T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-30T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-07T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-19T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Symantec aufgenommen"
},
{
"date": "2019-09-11T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Citrix aufgenommen"
},
{
"date": "2019-09-23T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-24T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-14T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-23T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-30T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Pulse Secure aufgenommen"
},
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Fortinet aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2020-02-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2020-06-03T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Infoblox aufgenommen"
},
{
"date": "2020-09-15T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Aruba aufgenommen"
},
{
"date": "2020-09-24T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2020-10-14T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-01-13T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-05-20T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2021-06-03T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2021-07-14T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-07-25T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-28T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-04-10T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Siemens aufgenommen"
}
],
"status": "final",
"version": "46"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T016785",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
},
{
"category": "product_name",
"name": "Aruba ClearPass Policy Manager",
"product": {
"name": "Aruba ClearPass Policy Manager",
"product_id": "274506",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.3.0.60730"
}
}
},
{
"category": "product_name",
"name": "Aruba Switch",
"product": {
"name": "Aruba Switch",
"product_id": "T016786",
"product_identification_helper": {
"cpe": "cpe:/h:arubanetworks:switch:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems NetScaler",
"product": {
"name": "Citrix Systems NetScaler",
"product_id": "70427",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:netscaler:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fortinet FortiGate",
"product": {
"name": "Fortinet FortiGate",
"product_id": "T004020",
"product_identification_helper": {
"cpe": "cpe:/h:fortinet:fortigate:-"
}
}
}
],
"category": "vendor",
"name": "Fortinet"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Fabric OS",
"product": {
"name": "HPE Fabric OS",
"product_id": "T019403",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:-"
}
}
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Network Attached Storage",
"product": {
"name": "Hitachi Network Attached Storage",
"product_id": "T011055",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:virtual_storage_platform:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM FlashSystem",
"product": {
"name": "IBM FlashSystem",
"product_id": "T025159",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:-"
}
}
},
{
"category": "product_name",
"name": "IBM SAN Volume Controller",
"product": {
"name": "IBM SAN Volume Controller",
"product_id": "T002782",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:san_volume_controller:-"
}
}
},
{
"category": "product_name",
"name": "IBM Storwize",
"product": {
"name": "IBM Storwize",
"product_id": "T021621",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Infoblox NIOS \u003c 8.3.7",
"product": {
"name": "Infoblox NIOS \u003c 8.3.7",
"product_id": "T015901",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:8.3.7"
}
}
}
],
"category": "vendor",
"name": "Infoblox"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "5930",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Pulse Secure Pulse Connect Secure \u003c 9.0R5",
"product": {
"name": "Pulse Secure Pulse Connect Secure \u003c 9.0R5",
"product_id": "T015309",
"product_identification_helper": {
"cpe": "cpe:/a:pulsesecure:pulse_connect_secure:9.0r5"
}
}
},
{
"category": "product_name",
"name": "Pulse Secure Pulse Connect Secure \u003c 9.1R3",
"product": {
"name": "Pulse Secure Pulse Connect Secure \u003c 9.1R3",
"product_id": "T015310",
"product_identification_helper": {
"cpe": "cpe:/a:pulsesecure:pulse_connect_secure:9.1r3"
}
}
}
],
"category": "product_name",
"name": "Pulse Connect Secure"
}
],
"category": "vendor",
"name": "Pulse Secure"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7",
"product": {
"name": "Siemens SIMATIC S7",
"product_id": "T020086",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:-"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11479"
}
]
}
WID-SEC-W-2023-0507
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0507 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0507.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0507 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0507"
},
{
"category": "external",
"summary": "Siemens Security Advisory SSA-462066 vom 2023-04-11",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 1164286 vom 2023-02-28",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023022829"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1479"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1480"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1481"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1482"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1483"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1484"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1485"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1486"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1487"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1488"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1489"
},
{
"category": "external",
"summary": "RedHat Security Advisories vom 2019-06-17",
"url": "https://access.redhat.com/errata/RHSA-2019:1490"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory",
"url": "https://security.archlinux.org/ASA-201906-12"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4684.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4685.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4686.html"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory",
"url": "https://usn.ubuntu.com/4017-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Advisory",
"url": "https://usn.ubuntu.com/4017-2/"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-4689.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory",
"url": "http://linux.oracle.com/errata/ELSA-2019-1481.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1.html"
},
{
"category": "external",
"summary": "SuSE Security Advisory",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1.html"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-15 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-15"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-14 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-14"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201906-13 vom 2019-06-18",
"url": "https://security.archlinux.org/ASA-201906-13"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1488 vom 2019-06-18",
"url": "http://linux.oracle.com/errata/ELSA-2019-1488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14089-1 vom 2019-06-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0026 vom 2019-06-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-June/000945.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1550-1 vom 2019-06-19",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:1481 vom 2019-06-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-1481-Important-CentOS-7-kernel-Security-Update-tp4645573.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:1488 vom 2019-06-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-1488-Important-CentOS-6-kernel-Security-Update-tp4645572.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1588-1 vom 2019-06-21",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1581-1 vom 2019-06-21",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1668-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191668-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1674-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191674-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1671-1 vom 2019-06-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191671-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1692-1 vom 2019-06-25",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191692-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1594 vom 2019-06-25",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1602 vom 2019-06-26",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"category": "external",
"summary": "BLUECOAT Security Advisory SA41 vom 2019-06-27",
"url": "http://www.arista.com/en/support/advisories-notices/security-advisories/8066-security-advisory-41"
},
{
"category": "external",
"summary": "VMware Security Advisory VMSA-2019-0010 vom 2019-07-02",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX256725 vom 2019-07-09",
"url": "https://support.citrix.com/article/CTX256725"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1699 vom 2019-07-08",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1855-1 vom 2019-07-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191855-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1851-1 vom 2019-07-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1870-1 vom 2019-07-17",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1888-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191888-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1889-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191889-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1882-1 vom 2019-07-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191882-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4484 vom 2019-07-21",
"url": "https://www.debian.org/security/2019/dsa-4484"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1935-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191935-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1948-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191948-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1924-1 vom 2019-07-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191924-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1873 vom 2019-07-30",
"url": "http://linux.oracle.com/errata/ELSA-2019-1873.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2069-1 vom 2019-08-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192069-1.html"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2020-303 vom 2020-02-07",
"url": "http://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2020/2020_303.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2029.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-1959 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-1959.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2411 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-2411.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "Symantec Security Advisory SYMSA1492 vom 2019-09-06",
"url": "https://support.symantec.com/us/en/article.SYMSA1492.html"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX256918 vom 2019-09-12",
"url": "https://support.citrix.com/article/CTX256918"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2658-1 vom 2019-10-15",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2756-1 vom 2019-10-24",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192756-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2821-1 vom 2019-10-30",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1.html"
},
{
"category": "external",
"summary": "Pulse Secure Security Advisory SA44193 vom 2019-11-06",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193/?kA23Z000000L6LMSA0="
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2950-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html"
},
{
"category": "external",
"summary": "FortiGuard Labs PSIRT Advisory FG-IR-19-180 vom 2019-11-29",
"url": "https://fortiguard.com/psirt/FG-IR-19-180"
},
{
"category": "external",
"summary": "NIOS 8.3.7 Released 18 FEB 2020",
"url": "https://support.infoblox.com/app/answers/detail/a_id/11591"
},
{
"category": "external",
"summary": "Infoblox Advisory 0622 vom 2020-06-04",
"url": "https://support.infoblox.com/app/answers/detail/a_id/10622"
},
{
"category": "external",
"summary": "HPE Security Bulletin hpesbst04140en_us vom 2021-06-02",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04140en_us"
},
{
"category": "external",
"summary": "Aruba Product Security Advisory ARUBA-PSA-2020-010 vom 2020-09-16",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBNW04041 rev.1 vom 2020-09-23",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbnw04041en_us"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11053 vom 2020-10-14",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11053"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2019-827 vom 2021-05-20",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-827"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11104 vom 2021-01-13",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11104\u0026cat=SIRT_1"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11205 vom 2021-07-14",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11205\u0026cat=SIRT_1"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04141en_us"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2023-04-10T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:45:38.641+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0507",
"initial_release_date": "2019-06-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: DLA-1823"
},
{
"date": "2019-06-17T22:00:00.000+00:00",
"number": "3",
"summary": "Korrektur Status"
},
{
"date": "2019-06-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Arch Linux, Oracle Linux, SUSE, ORACLE und CentOS aufgenommen"
},
{
"date": "2019-06-20T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-23T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-24T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-25T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-06-26T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von BLUECOAT aufgenommen"
},
{
"date": "2019-06-27T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2019-06-30T22:00:00.000+00:00",
"number": "11",
"summary": "Referenz(en) aufgenommen: USN-4041-1, USN-4041-2"
},
{
"date": "2019-07-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von VMware aufgenommen"
},
{
"date": "2019-07-08T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Citrix und Red Hat aufgenommen"
},
{
"date": "2019-07-15T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-17T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-18T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-21T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2019-07-23T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-07-30T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-07T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-19T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Symantec aufgenommen"
},
{
"date": "2019-09-11T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Citrix aufgenommen"
},
{
"date": "2019-09-23T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-24T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-14T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-23T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-30T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Pulse Secure aufgenommen"
},
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Fortinet aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2020-02-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2020-06-03T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Infoblox aufgenommen"
},
{
"date": "2020-09-15T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Aruba aufgenommen"
},
{
"date": "2020-09-24T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2020-10-14T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-01-13T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-05-20T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2021-06-03T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2021-07-14T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2021-07-25T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-02-28T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-04-10T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Siemens aufgenommen"
}
],
"status": "final",
"version": "46"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Aruba ArubaOS",
"product": {
"name": "Aruba ArubaOS",
"product_id": "T016785",
"product_identification_helper": {
"cpe": "cpe:/o:arubanetworks:arubaos:-"
}
}
},
{
"category": "product_name",
"name": "Aruba ClearPass Policy Manager",
"product": {
"name": "Aruba ClearPass Policy Manager",
"product_id": "274506",
"product_identification_helper": {
"cpe": "cpe:/a:arubanetworks:clearpass_policy_manager:6.3.0.60730"
}
}
},
{
"category": "product_name",
"name": "Aruba Switch",
"product": {
"name": "Aruba Switch",
"product_id": "T016786",
"product_identification_helper": {
"cpe": "cpe:/h:arubanetworks:switch:-"
}
}
}
],
"category": "vendor",
"name": "Aruba"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems NetScaler",
"product": {
"name": "Citrix Systems NetScaler",
"product_id": "70427",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:netscaler:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fortinet FortiGate",
"product": {
"name": "Fortinet FortiGate",
"product_id": "T004020",
"product_identification_helper": {
"cpe": "cpe:/h:fortinet:fortigate:-"
}
}
}
],
"category": "vendor",
"name": "Fortinet"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Fabric OS",
"product": {
"name": "HPE Fabric OS",
"product_id": "T019403",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:-"
}
}
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Network Attached Storage",
"product": {
"name": "Hitachi Network Attached Storage",
"product_id": "T011055",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:virtual_storage_platform:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM FlashSystem",
"product": {
"name": "IBM FlashSystem",
"product_id": "T025159",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:-"
}
}
},
{
"category": "product_name",
"name": "IBM SAN Volume Controller",
"product": {
"name": "IBM SAN Volume Controller",
"product_id": "T002782",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:san_volume_controller:-"
}
}
},
{
"category": "product_name",
"name": "IBM Storwize",
"product": {
"name": "IBM Storwize",
"product_id": "T021621",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Infoblox NIOS \u003c 8.3.7",
"product": {
"name": "Infoblox NIOS \u003c 8.3.7",
"product_id": "T015901",
"product_identification_helper": {
"cpe": "cpe:/o:infoblox:nios:8.3.7"
}
}
}
],
"category": "vendor",
"name": "Infoblox"
},
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "5930",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "6368",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Pulse Secure Pulse Connect Secure \u003c 9.0R5",
"product": {
"name": "Pulse Secure Pulse Connect Secure \u003c 9.0R5",
"product_id": "T015309",
"product_identification_helper": {
"cpe": "cpe:/a:pulsesecure:pulse_connect_secure:9.0r5"
}
}
},
{
"category": "product_name",
"name": "Pulse Secure Pulse Connect Secure \u003c 9.1R3",
"product": {
"name": "Pulse Secure Pulse Connect Secure \u003c 9.1R3",
"product_id": "T015310",
"product_identification_helper": {
"cpe": "cpe:/a:pulsesecure:pulse_connect_secure:9.1r3"
}
}
}
],
"category": "product_name",
"name": "Pulse Connect Secure"
}
],
"category": "vendor",
"name": "Pulse Secure"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7",
"product": {
"name": "Siemens SIMATIC S7",
"product_id": "T020086",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:-"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11477",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-11478",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11478"
},
{
"cve": "CVE-2019-11479",
"notes": [
{
"category": "description",
"text": "Im Linux Kernel existieren mehrere Schwachstellen. Diese bestehen aufgrund einer unsachgem\u00e4\u00dfen Verarbeitung von TCP-Segmenten im Linux Kernel Netzwerk-Subsystem. Ein entfernter anonymer Angreifer kann diese Schwachstellen ausnutzen, um durch das Senden speziell gestalteter Pakete einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T002782",
"67646",
"6368",
"T015844",
"T013312",
"T005119",
"T011055",
"T016786",
"T004914",
"T016785",
"T021621",
"T019403",
"2951",
"T002207",
"T000126",
"5930",
"T025159",
"1727",
"70427",
"274506",
"T004020",
"T020086"
]
},
"release_date": "2019-06-17T22:00:00.000+00:00",
"title": "CVE-2019-11479"
}
]
}
ghsa-748j-px2m-cwgh
Vulnerability from github
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
{
"affected": [],
"aliases": [
"CVE-2019-11477"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-06-19T00:15:00Z",
"severity": "HIGH"
},
"details": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"id": "GHSA-748j-px2m-cwgh",
"modified": "2024-02-27T21:31:22Z",
"published": "2022-05-24T16:48:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11477"
},
{
"type": "WEB",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"type": "WEB",
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"type": "WEB",
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190625-0001"
},
{
"type": "WEB",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"type": "WEB",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"type": "WEB",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"type": "WEB",
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"type": "WEB",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"type": "WEB",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2019-11477
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@ubuntu.com | http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html | Third Party Advisory, VDB Entry | |
| security@ubuntu.com | http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html | Third Party Advisory, VDB Entry | |
| security@ubuntu.com | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt | Third Party Advisory | |
| security@ubuntu.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en | Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/06/20/3 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/07/06/3 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/07/06/4 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/10/24/1 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.openwall.com/lists/oss-security/2019/10/29/3 | Mailing List, Third Party Advisory | |
| security@ubuntu.com | http://www.vmware.com/security/advisories/VMSA-2019-0010.html | Third Party Advisory | |
| security@ubuntu.com | https://access.redhat.com/errata/RHSA-2019:1594 | Third Party Advisory | |
| security@ubuntu.com | https://access.redhat.com/errata/RHSA-2019:1602 | Third Party Advisory | |
| security@ubuntu.com | https://access.redhat.com/errata/RHSA-2019:1699 | Third Party Advisory | |
| security@ubuntu.com | https://access.redhat.com/security/vulnerabilities/tcpsack | Third Party Advisory | |
| security@ubuntu.com | https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf | Third Party Advisory | |
| security@ubuntu.com | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff | Mailing List, Patch, Vendor Advisory | |
| security@ubuntu.com | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md | Patch, Third Party Advisory | |
| security@ubuntu.com | https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 | Third Party Advisory | |
| security@ubuntu.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10287 | Third Party Advisory | |
| security@ubuntu.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006 | Third Party Advisory | |
| security@ubuntu.com | https://security.netapp.com/advisory/ntap-20190625-0001/ | Third Party Advisory | |
| security@ubuntu.com | https://support.f5.com/csp/article/K78234183 | Third Party Advisory | |
| security@ubuntu.com | https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic | Mitigation, Third Party Advisory | |
| security@ubuntu.com | https://www.kb.cert.org/vuls/id/905115 | Third Party Advisory, US Government Resource | |
| security@ubuntu.com | https://www.oracle.com/security-alerts/cpujan2020.html | Third Party Advisory | |
| security@ubuntu.com | https://www.oracle.com/security-alerts/cpuoct2020.html | Third Party Advisory | |
| security@ubuntu.com | https://www.synology.com/security/advisory/Synology_SA_19_28 | Third Party Advisory | |
| security@ubuntu.com | https://www.us-cert.gov/ics/advisories/icsa-19-253-03 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/06/20/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/07/06/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/07/06/4 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/10/24/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2019/10/29/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2019-0010.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1594 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1602 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1699 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/tcpsack | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff | Mailing List, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10287 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190625-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K78234183 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/905115 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2020.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/security/advisory/Synology_SA_19_28 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-19-253-03 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | 15.0.0 | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | 15.0.0 | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | 15.0.0 | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | 15.0.0 | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | 15.0.0 | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-ip_webaccelerator | 15.0.0 | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | 15.0.0 | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | 15.0.0 | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | 15.0.0 | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | 15.0.0 | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | 15.0.0 | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_edge_gateway | 15.0.0 | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | 15.0.0 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 18.10 | |
| canonical | ubuntu_linux | 19.04 | |
| redhat | enterprise_linux_atomic_host | - | |
| redhat | enterprise_linux | 5.0 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux_aus | 6.5 | |
| redhat | enterprise_linux_aus | 6.6 | |
| redhat | enterprise_linux_eus | 7.4 | |
| redhat | enterprise_linux_eus | 7.5 | |
| redhat | enterprise_mrg | 2.0 | |
| ivanti | connect_secure | - | |
| pulsesecure | pulse_policy_secure | - | |
| pulsesecure | pulse_secure_virtual_application_delivery_controller | - | |
| f5 | traffix_signaling_delivery_controller | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "190D94DD-9CDB-413B-9A15-BFBDB1BB127C",
"versionEndExcluding": "3.16.69",
"versionStartIncluding": "2.6.29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D641CA66-86A4-4172-9D98-206C31578C5E",
"versionEndExcluding": "4.4.182",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "966342A3-015F-4BCC-A513-335362A79A26",
"versionEndExcluding": "4.9.182",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A632572-BC71-422E-B953-346709BA1658",
"versionEndExcluding": "4.14.127",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91C6131-9445-46E6-960B-76E8A34DC7E4",
"versionEndExcluding": "4.19.52",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E372D7-8DD5-45E7-9C26-CF389B1A09A5",
"versionEndExcluding": "5.1.11",
"versionStartIncluding": "4.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33AF102E-2851-45B5-8C71-B393F34D4591",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4EA2A9-C197-40D4-A6AE-A64D69536F99",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3215E6-7223-4AF1-BFD3-BD8AE9B6B572",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "720A06E3-441B-4D51-8FC0-D569DD7FEB10",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF1C75A-F753-40CB-9E26-DA6D31931DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A057B236-8B7C-430D-B107-8FF96D132E73",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D7877E8-E50F-4DC6-867D-C19A8DB533E3",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "899BE6FE-B23F-4236-8A5E-B41AFF28E533",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEBAD7C4-AC37-463F-B63C-6EAD5542F2A0",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C046FBE7-DCCD-40FE-AC1F-4DAD11D2E0AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66FC8C37-629D-4FBA-9C79-615BDDCF7837",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66FCB095-3E70-472A-AB9D-60F001F3A539",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA39C4F5-4D97-4B0B-8DA9-780F7ACF0A74",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833083-97E9-4B3C-8E6B-BCAC1851D148",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C7C45A-CC14-4092-903C-3001986D2859",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42EBAE78-C03E-42C9-AC2D-D654A8DF8516",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75D817B1-EC06-4180-B272-067299818B09",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3A4646-9AAA-445E-A08F-226D41485DC2",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09C950E6-BF12-43D4-9125-AD9D90EDD67A",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A99DC2F-BFC7-4FEA-87DF-5E9DF428F2D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "255D11E3-F502-45CD-8958-5989F179574E",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E72B035F-97C1-41C6-B424-F3929B9D7A99",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E058E775-EAAA-46DF-9F3D-A8D042AAFD88",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AD3B4BB-7F5C-4565-9345-2D4895630AAD",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B872A0D5-9B23-40F2-8AAB-253A4F406D18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10A57948-C53A-4CD0-801B-7E801D08E112",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F367EED9-1F71-4720-BE53-3074FF6049C9",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20BF15AA-1183-489E-A24A-FFB5BFD84664",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83B684D2-5889-41EA-B54A-8E7AF43DA647",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45D0AF1B-9106-4C38-B1A2-87FC189ADBAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A258E-4F20-4C3C-8269-CD7554539EC6",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5E9908-C959-48FD-8FAC-C0FE329E6FD8",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "442A56A6-935D-427A-8562-144DD770E317",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6434ED4F-0BA2-445A-B6E9-D3E301EE3930",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2A9F32-FF72-44AA-AA1A-5B09E8E57E24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA668DC-EFB6-44C3-8521-47BB9F474DD1",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23EFF81-0FF4-4B4A-BAC3-85EC62230099",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24AB3C9F-77E5-4D87-A9C1-366B087E7F68",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D17CC587-3325-4D95-BE63-B948C63B411D",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB6D7D8-2688-48A2-8E3E-341881EF0B4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24904D5C-58FF-49B0-B598-F798BAD110E6",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE11CCA1-58BF-462E-A0DE-49F3BC1C5499",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "639FCD86-C487-40DD-9840-8931FAF5DF3A",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1117B40B-36E7-4205-82B0-52B4862A6D03",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12F0D363-0DE8-4E32-9187-D7ACA0868BD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB112ABE-C07E-480F-8042-6321E602183D",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A751827-1169-408E-BCE6-A129BDDB489D",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "428C4BEA-AFDA-45EC-9D5F-DDF409461C33",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "717C0443-3E88-4814-8D4A-F0C067176228",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3879431-2E02-4B6C-BB4F-C2FF631A0974",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7865E258-CDA0-43A5-9945-81E07BF11A82",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAECED76-81A2-4A0C-8C2E-24C235BB32DE",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC38EF1-6210-40A1-88FC-964C470E41BA",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "713EB3E7-A657-4F6A-901D-618AF660CBBC",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EACA0835-51AD-4AC0-8C87-5564F3A821CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B572C267-AF06-4270-8FDC-18EBDDED7879",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88B12CA1-E853-4898-8A06-F991BE19A27A",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C98DCCF-2D89-4C05-A0AE-60CF8228B860",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B439DE9D-6A09-4487-82A4-E75A57717CAB",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4F1CFB-0FD9-4AEB-BF25-093115F9D891",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19428E8B-18C2-413A-A3C0-AC6AB9F952F2",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6166E0DB-2BA5-454D-ABBC-9E4916436A44",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F42F4AF6-4BCC-497E-A889-0BBCA965CB32",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC2164D-11D0-4DCD-B814-6AB185C3BADF",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4AE425-1D86-4DB9-8B8F-74C6678BD528",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF483911-003B-470B-A12B-85EF34A50469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "79191794-6151-46E9-AAFD-3EC0C05B03B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "893A7EE9-495D-405A-B809-39DC80778B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97D046F5-FF1A-41A7-8EDE-2C93E335906E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C8792C-1CF0-450B-A8BD-2B5274156053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CCBFDE-C2FA-40E3-AA44-0EB0A6861BD4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E52F91D-3F39-4D89-8069-EC422FB1F700",
"versionEndIncluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
},
{
"lang": "es",
"value": "Jonathan Looney detect\u00f3 que el valor TCP_SKB_CB(skb)-mayor que tcp_gso_segs estuvo sujeto a un desbordamiento de enteros en el kernel de Linux durante el manejo del Reconocimiento Selectivo (SACK) de TCP. Un atacante remoto podr\u00eda usar esto para causar una denegaci\u00f3n de servicio. Esto se ha corregido en versiones de kernel estables 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, y se corrige en el commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
}
],
"id": "CVE-2019-11477",
"lastModified": "2024-11-21T04:21:09.480",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@ubuntu.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-06-19T00:15:12.640",
"references": [
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"source": "security@ubuntu.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
}
],
"sourceIdentifier": "security@ubuntu.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "security@ubuntu.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2019-11477
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2019-11477",
"description": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"id": "GSD-2019-11477",
"references": [
"https://www.suse.com/security/cve/CVE-2019-11477.html",
"https://www.debian.org/security/2019/dsa-4465",
"https://access.redhat.com/errata/RHSA-2019:1699",
"https://access.redhat.com/errata/RHSA-2019:1602",
"https://access.redhat.com/errata/RHSA-2019:1594",
"https://access.redhat.com/errata/RHSA-2019:1490",
"https://access.redhat.com/errata/RHSA-2019:1489",
"https://access.redhat.com/errata/RHSA-2019:1488",
"https://access.redhat.com/errata/RHSA-2019:1487",
"https://access.redhat.com/errata/RHSA-2019:1486",
"https://access.redhat.com/errata/RHSA-2019:1485",
"https://access.redhat.com/errata/RHSA-2019:1484",
"https://access.redhat.com/errata/RHSA-2019:1483",
"https://access.redhat.com/errata/RHSA-2019:1482",
"https://access.redhat.com/errata/RHSA-2019:1481",
"https://access.redhat.com/errata/RHSA-2019:1480",
"https://access.redhat.com/errata/RHSA-2019:1479",
"https://ubuntu.com/security/CVE-2019-11477",
"https://advisories.mageia.org/CVE-2019-11477.html",
"https://security.archlinux.org/CVE-2019-11477",
"https://alas.aws.amazon.com/cve/html/CVE-2019-11477.html",
"https://linux.oracle.com/cve/CVE-2019-11477.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-11477"
],
"details": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"id": "GSD-2019-11477",
"modified": "2023-12-13T01:24:02.386478Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"AKA": "SACK Panic",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2019-06-17T00:00:00.000Z",
"ID": "CVE-2019-11477",
"STATE": "PUBLIC",
"TITLE": "Integer overflow in TCP_SKB_CB(skb)-\u003etcp_gso_segs"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Linux kernel",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "4.4",
"version_value": "4.4.182"
},
{
"version_affected": "\u003c",
"version_name": "4.9",
"version_value": "4.9.182"
},
{
"version_affected": "\u003c",
"version_name": "4.14",
"version_value": "4.14.127"
},
{
"version_affected": "\u003c",
"version_name": "4.19",
"version_value": "4.19.52"
},
{
"version_affected": "\u003c",
"version_name": "5.1",
"version_value": "5.1.11"
}
]
}
}
]
},
"vendor_name": "Linux"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jonathan Looney from Netflix"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.7"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-190 Integer Overflow or Wraparound"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#905115",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"name": "[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"name": "RHSA-2019:1594",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"name": "RHSA-2019:1602",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"name": "[oss-security] 20190706 Re: linux-distros membership application - Microsoft",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"name": "RHSA-2019:1699",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"name": "[oss-security] 20191023 Membership application for linux-distros - VMware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"name": "[oss-security] 20191029 Re: Membership application for linux-distros - VMware",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"name": "https://www.oracle.com/security-alerts/cpujan2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md",
"refsource": "MISC",
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"name": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic",
"refsource": "MISC",
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/tcpsack",
"refsource": "MISC",
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"name": "https://support.f5.com/csp/article/K78234183",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"name": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"name": "https://www.synology.com/security/advisory/Synology_SA_19_28",
"refsource": "CONFIRM",
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190625-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"name": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03",
"refsource": "MISC",
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
},
{
"name": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt",
"refsource": "CONFIRM",
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
}
]
},
"source": {
"advisory": "https://usn.ubuntu.com/4017-1",
"defect": [
"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831637"
],
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "190D94DD-9CDB-413B-9A15-BFBDB1BB127C",
"versionEndExcluding": "3.16.69",
"versionStartIncluding": "2.6.29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D641CA66-86A4-4172-9D98-206C31578C5E",
"versionEndExcluding": "4.4.182",
"versionStartIncluding": "3.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "966342A3-015F-4BCC-A513-335362A79A26",
"versionEndExcluding": "4.9.182",
"versionStartIncluding": "4.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A632572-BC71-422E-B953-346709BA1658",
"versionEndExcluding": "4.14.127",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91C6131-9445-46E6-960B-76E8A34DC7E4",
"versionEndExcluding": "4.19.52",
"versionStartIncluding": "4.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E372D7-8DD5-45E7-9C26-CF389B1A09A5",
"versionEndExcluding": "5.1.11",
"versionStartIncluding": "4.20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33AF102E-2851-45B5-8C71-B393F34D4591",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4EA2A9-C197-40D4-A6AE-A64D69536F99",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3215E6-7223-4AF1-BFD3-BD8AE9B6B572",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "720A06E3-441B-4D51-8FC0-D569DD7FEB10",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF1C75A-F753-40CB-9E26-DA6D31931DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A057B236-8B7C-430D-B107-8FF96D132E73",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D7877E8-E50F-4DC6-867D-C19A8DB533E3",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "899BE6FE-B23F-4236-8A5E-B41AFF28E533",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEBAD7C4-AC37-463F-B63C-6EAD5542F2A0",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C046FBE7-DCCD-40FE-AC1F-4DAD11D2E0AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66FC8C37-629D-4FBA-9C79-615BDDCF7837",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66FCB095-3E70-472A-AB9D-60F001F3A539",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA39C4F5-4D97-4B0B-8DA9-780F7ACF0A74",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2833083-97E9-4B3C-8E6B-BCAC1851D148",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C7C45A-CC14-4092-903C-3001986D2859",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42EBAE78-C03E-42C9-AC2D-D654A8DF8516",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75D817B1-EC06-4180-B272-067299818B09",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3A4646-9AAA-445E-A08F-226D41485DC2",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09C950E6-BF12-43D4-9125-AD9D90EDD67A",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A99DC2F-BFC7-4FEA-87DF-5E9DF428F2D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "255D11E3-F502-45CD-8958-5989F179574E",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E72B035F-97C1-41C6-B424-F3929B9D7A99",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E058E775-EAAA-46DF-9F3D-A8D042AAFD88",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AD3B4BB-7F5C-4565-9345-2D4895630AAD",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B872A0D5-9B23-40F2-8AAB-253A4F406D18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10A57948-C53A-4CD0-801B-7E801D08E112",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F367EED9-1F71-4720-BE53-3074FF6049C9",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20BF15AA-1183-489E-A24A-FFB5BFD84664",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83B684D2-5889-41EA-B54A-8E7AF43DA647",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45D0AF1B-9106-4C38-B1A2-87FC189ADBAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E4A258E-4F20-4C3C-8269-CD7554539EC6",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5E9908-C959-48FD-8FAC-C0FE329E6FD8",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "442A56A6-935D-427A-8562-144DD770E317",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6434ED4F-0BA2-445A-B6E9-D3E301EE3930",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2A9F32-FF72-44AA-AA1A-5B09E8E57E24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA668DC-EFB6-44C3-8521-47BB9F474DD1",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C23EFF81-0FF4-4B4A-BAC3-85EC62230099",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24AB3C9F-77E5-4D87-A9C1-366B087E7F68",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D17CC587-3325-4D95-BE63-B948C63B411D",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB6D7D8-2688-48A2-8E3E-341881EF0B4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24904D5C-58FF-49B0-B598-F798BAD110E6",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE11CCA1-58BF-462E-A0DE-49F3BC1C5499",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "639FCD86-C487-40DD-9840-8931FAF5DF3A",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1117B40B-36E7-4205-82B0-52B4862A6D03",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12F0D363-0DE8-4E32-9187-D7ACA0868BD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB112ABE-C07E-480F-8042-6321E602183D",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A751827-1169-408E-BCE6-A129BDDB489D",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "428C4BEA-AFDA-45EC-9D5F-DDF409461C33",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "717C0443-3E88-4814-8D4A-F0C067176228",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3879431-2E02-4B6C-BB4F-C2FF631A0974",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7865E258-CDA0-43A5-9945-81E07BF11A82",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAECED76-81A2-4A0C-8C2E-24C235BB32DE",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC38EF1-6210-40A1-88FC-964C470E41BA",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "713EB3E7-A657-4F6A-901D-618AF660CBBC",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EACA0835-51AD-4AC0-8C87-5564F3A821CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B572C267-AF06-4270-8FDC-18EBDDED7879",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88B12CA1-E853-4898-8A06-F991BE19A27A",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C98DCCF-2D89-4C05-A0AE-60CF8228B860",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B439DE9D-6A09-4487-82A4-E75A57717CAB",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA4F1CFB-0FD9-4AEB-BF25-093115F9D891",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19428E8B-18C2-413A-A3C0-AC6AB9F952F2",
"versionEndIncluding": "11.6.4",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6166E0DB-2BA5-454D-ABBC-9E4916436A44",
"versionEndIncluding": "12.1.4",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F42F4AF6-4BCC-497E-A889-0BBCA965CB32",
"versionEndIncluding": "13.1.1",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC2164D-11D0-4DCD-B814-6AB185C3BADF",
"versionEndIncluding": "14.1.0",
"versionStartIncluding": "14.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4AE425-1D86-4DB9-8B8F-74C6678BD528",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF483911-003B-470B-A12B-85EF34A50469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "79191794-6151-46E9-AAFD-3EC0C05B03B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "893A7EE9-495D-405A-B809-39DC80778B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97D046F5-FF1A-41A7-8EDE-2C93E335906E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C8792C-1CF0-450B-A8BD-2B5274156053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3CCBFDE-C2FA-40E3-AA44-0EB0A6861BD4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E52F91D-3F39-4D89-8069-EC422FB1F700",
"versionEndIncluding": "5.1.0",
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
},
{
"lang": "es",
"value": "Jonathan Looney detect\u00f3 que el valor TCP_SKB_CB(skb)-mayor que tcp_gso_segs estuvo sujeto a un desbordamiento de enteros en el kernel de Linux durante el manejo del Reconocimiento Selectivo (SACK) de TCP. Un atacante remoto podr\u00eda usar esto para causar una denegaci\u00f3n de servicio. Esto se ha corregido en versiones de kernel estables 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, y se corrige en el commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff."
}
],
"id": "CVE-2019-11477",
"lastModified": "2024-02-27T21:04:17.560",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security@ubuntu.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-06-19T00:15:12.640",
"references": [
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/20/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/24/1"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2019/10/29/3"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2019-0010.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1594"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1602"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1699"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/vulnerabilities/tcpsack"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff"
},
{
"source": "security@ubuntu.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20190625-0001/"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K78234183"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/905115"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2020.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/security/advisory/Synology_SA_19_28"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-253-03"
}
],
"sourceIdentifier": "security@ubuntu.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "security@ubuntu.com",
"type": "Secondary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.